Network Vulnerability Assessment Report
11.02.2005
Sorted by host names

Session name: Compex_NetPassage26GStart Time:11.02.2005 14:57:13
Finish Time:11.02.2005 15:01:22
Elapsed:0 day(s) 00:04:09
Total records generated:8
high severity:1
Medium severity:2
informational:5


192.168.1.22

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
general/icmp
High

The remote host is vulnerable to an 'Etherleak' -
the remote ethernet driver seems to leak bits of the
content of the memory of the remote operating system.

Note that an attacker may take advantage of this flaw
only when its target is on the same physical subnet.

See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt
Solution : Contact your vendor for a fix
Risk factor : High
CVE : CAN-2003-0001
BID : 6535
general/icmp
Medium

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
general/tcp
Medium

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
general/tcp
Info
The remote host is running one of these operating systems :
Linux Kernel 2.6
Linux Kernel 2.4
general/tcp
Info
192.168.1.22 resolves as kruger.dnepr.net.ru.
general/udp
Info
For your information, here is the traceroute to 192.168.1.22 :
192.168.1.37
?
192.168.1.22

www (80/tcp)
Info
A web server is running on this port