Network Vulnerability Assessment Report
21.10.2005
Sorted by host names

Session name: np-27gStart Time:21.10.2005 11:13:32
Finish Time:21.10.2005 11:18:14
Elapsed:0 day(s) 00:04:42
Total records generated:15
high severity:0
Medium severity:4
informational:11


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.25043Finished


10.0.0.25

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
netbios-ns (137/udp)
Info
Port is open
ftp (21/tcp)
Info
Port is open
netbios-ns (137/udp)
Medium
The following 5 NetBIOS names have been gathered :
ROUTER = This is the computer name registered for workstation services by a WINS client.
ROUTER = This is the current logged in user registered for this workstation.
ROUTER = Computer name
MYGROUP = Workgroup / Domain name
MYGROUP = Workgroup / Domain name (part of the Browser elections)

. This SMB server seems to be a SAMBA server (this is not a security
risk, this is for your information). This can be told because this server
claims to have a null MAC address

If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.

Risk factor : Medium
CVE : CAN-1999-0621
general/icmp
Medium

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
general/tcp
Medium

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
ftp (21/tcp)
Medium

This FTP service allows anonymous logins. If you do not want to share data
with anyone you do not know, then you should deactivate the anonymous account,
since it may only cause troubles.

The content of the remote FTP root is :

drwxr-xr-x 1 0 0 0 Jan 1 00:00 //.

drwxr-xr-x 1 0 0 0 Jan 1 00:00 //..

drwxr-xr-x 4 0 0 0 Jan 1 1970 //sda_drive01



Risk factor : Low
CVE : CAN-1999-0497
ftp (21/tcp)
Info
Remote FTP server banner :
220 ROUTER FTP server (GNU inetutils 1.4.1) ready.

ftp (21/tcp)
Info
An FTP server is running on this port.
Here is its banner :
220 ROUTER FTP server (GNU inetutils 1.4.1) ready.

www (80/tcp)
Info

This web server is [mis]configured in that it
does not return '404 Not Found' error codes when
a non-existent file is requested, perhaps returning
a site map, search page or authentication page instead.

Nessus enabled some counter measures for that, however
they might be insufficient. If a great number of security
holes are produced for this port, they might not all be accurate
www (80/tcp)
Info
The remote web server type is :

GoAhead-Webs


general/udp
Info
For your information, here is the traceroute to 10.0.0.25 :
10.0.0.59
?
10.0.0.25

ftp (21/tcp)
Info
Remote FTP server banner :
220 ROUTER FTP server (GNU inetutils 1.4.1) ready.


www (80/tcp)
Info
A web server is running on this port
general/tcp
Info

** All ports were skipped by this check because some
** scripts could not connect to them before the defined timeout

This might be an availability problem related which might be
due to the following reasons :

- The remote host is now down, either because a user turned it
off during the scan

- A network outage has been experienced during the scan, and the remote
network cannot be reached from the Nessus server any more

- This Nessus server has been blacklisted by the system administrator
or by automatic intrusion detection/prevention systems which have detected the
vulnerability assessment.


In any case, the audit of the remote host might be incomplete and may need to
be done again