Network Vulnerability Assessment Report
23.03.2004
Sorted by host names

Session name: Gigabyte gn-br404wStart Time:23.03.2004 15:50:43
Finish Time:23.03.2004 15:53:12
Elapsed:0 day(s) 00:02:28
Total records generated:12
high severity:1
low severity:9
informational:2


Summary of scanned hosts

HostHolesWarningsOpen portsState
20.0.0.1192Finished


20.0.0.1

ServiceSeverityDescription
domain (53/udp)
Info
Port is open
www (80/tcp)
Info
Port is open
general/icmp
High

The remote host is vulnerable to an 'Etherleak' -
the remote ethernet driver seems to leak bits of the
content of the memory of the remote operating system.

Note that an attacker may take advantage of this flaw
only when its target is on the same physical subnet.

See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt
Solution : Contact your vendor for a fix
Risk factor : Serious
CVE : CAN-2003-0001
BID : 6535
domain (53/udp)
Low

A DNS server is running on this port. If you do not use it, disable it.

Risk factor : Low
domain (53/udp)
Low

The remote name server allows recursive queries to be performed
by the host running nessusd.

If this is your internal nameserver, then forget this warning.

If you are probing a remote nameserver, then it allows anyone
to use it to resolve third parties names (such as www.nessus.org).
This allows hackers to do cache poisoning attacks against this
nameserver.

If the host allows these recursive queries via UDP,
then the host can be used to 'bounce' Denial of Service attacks
against another network or system.

See also : http://www.cert.org/advisories/CA-1997-22.html

Solution : Restrict recursive queries to the hosts that should
use this nameserver (such as those of the LAN connected to it).

If you are using bind 8, you can do this by using the instruction
'allow-recursion' in the 'options' section of your named.conf

If you are using bind 9, you can define a grouping of internal addresses
using the 'acl' command

Then, within the options block, you can explicitly state:
'allow-recursion { hosts_defined_in_acl }'

For more info on Bind 9 administration (to include recursion), see:
http://www.nominum.com/content/documents/bind9arm.pdf

If you are using another name server, consult its documentation.

Risk factor : Serious
CVE : CVE-1999-0024
BID : 678
general/udp
Low
For your information, here is the traceroute to 20.0.0.1 :
20.0.0.254
20.0.0.1

general/tcp
Low

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
general/icmp
Low

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
www (80/tcp)
Low
A web server is running on this port
www (80/tcp)
Low
The following directories were discovered:
/cgi-bin, /htdocs

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

www (80/tcp)
Low
Although it tries to hide its version,
this web server was fingerprinted as: mini_httpd/1.17beta1 or 1.18
domain (53/udp)
Low
It was not possible to fingerprint the remote DNS server.

If you know the type and version of the remote DNS server, please send
the following signature to dns-signatures@nessus.org :
0:0:0:0Q2:0:0:t:0:0:0:0:0:0:0Z0:0Z1:0Z2:0:0:0:0:0:0:0: