Network Vulnerability Assessment Report
19.10.2005
Sorted by host names

Session name: np-28gStart Time:19.10.2005 15:34:46
Finish Time:19.10.2005 15:39:47
Elapsed:0 day(s) 00:05:00
Total records generated:17
high severity:0
Medium severity:3
informational:14


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.66034Finished


10.0.0.66

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
ipp (631/tcp)
Info
Port is open
netbios-ns (137/udp)
Info
Port is open
ftp (21/tcp)
Info
Port is open
general/icmp
Medium

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
general/tcp
Medium

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
netbios-ns (137/udp)
Medium
The following 7 NetBIOS names have been gathered :
ROUTER = This is the computer name registered for workstation services by a WINS client.
ROUTER = This is the current logged in user registered for this workstation.
ROUTER = Computer name
__MSBROWSE__
IXBT = Workgroup / Domain name
IXBT
IXBT = Workgroup / Domain name (part of the Browser elections)

. This SMB server seems to be a SAMBA server (this is not a security
risk, this is for your information). This can be told because this server
claims to have a null MAC address

If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.

Risk factor : Medium
CVE : CAN-1999-0621
www (80/tcp)
Info
A web server is running on this port
ipp (631/tcp)
Info
A web server is running on this port
ftp (21/tcp)
Info
An FTP server is running on this port.
Here is its banner :
220 ROUTER FTP server (GNU inetutils 1.4.1) ready.

general/tcp
Info
10.0.0.66 resolves as ROUTER.ixbt.lab.
www (80/tcp)
Info

This web server is [mis]configured in that it
does not return '404 Not Found' error codes when
a non-existent file is requested, perhaps returning
a site map, search page or authentication page instead.

Nessus enabled some counter measures for that, however
they might be insufficient. If a great number of security
holes are produced for this port, they might not all be accurate
ipp (631/tcp)
Info
The remote web server type is :

CUPS/1.1


www (80/tcp)
Info
The remote web server type is :

GoAhead-Webs


general/udp
Info
For your information, here is the traceroute to 10.0.0.66 :
10.0.0.59
10.0.0.66

ftp (21/tcp)
Info
Remote FTP server banner :
220 ROUTER FTP server (GNU inetutils 1.4.1) ready.

general/tcp
Info

** All ports were skipped by this check because some
** scripts could not connect to them before the defined timeout

This might be an availability problem related which might be
due to the following reasons :

- The remote host is now down, either because a user turned it
off during the scan

- A network outage has been experienced during the scan, and the remote
network cannot be reached from the Nessus server any more

- This Nessus server has been blacklisted by the system administrator
or by automatic intrusion detection/prevention systems which have detected the
vulnerability assessment.


In any case, the audit of the remote host might be incomplete and may need to
be done again