Network Vulnerability Assessment Report
15.04.2004
Sorted by host names

Session name: x-micro-xwl-11gragStart Time:14.04.2004 19:04:06
Finish Time:14.04.2004 19:52:44
Elapsed:0 day(s) 00:48:38
Total records generated:2
high severity:0
low severity:2
informational:0


Scan configuration

Plugins used in this scan

IdName

Preferences settings for this scan

max_hosts 16
max_checks 10
log_whole_attack yes
cgi_path /cgi-bin
port_range 1-1024
optimize_test yes
language english
checks_read_timeout 5
non_simult_ports 139, 445
plugins_timeout 320
safe_checks yes
auto_enable_dependencies no
use_mac_addr no
save_knowledge_base yes
kb_restore no
only_test_hosts_whose_kb_we_dont_have no
only_test_hosts_whose_kb_we_have no
kb_dont_replay_scanners no
kb_dont_replay_info_gathering no
kb_dont_replay_attacks no
kb_dont_replay_denials no
kb_max_age 864000
plugin_upload no
plugin_upload_suffixes .nasl, .inc
slice_network_addresses no
ntp_save_sessions yes
ntp_detached_sessions yes
server_info_nessusd_version 2.0.10
server_info_libnasl_version 2.0.10
server_info_libnessus_version 2.0.10
server_info_thread_manager fork
server_info_os Linux
server_info_os_version 2.6.4-via4
reverse_lookup no
ntp_keep_communication_alive yes
ntp_opt_show_end yes
save_session yes
detached_scan no
continuous_scan no


Summary of scanned hosts

HostHolesWarningsOpen portsState
20.0.0.1020Finished


20.0.0.1

ServiceSeverityDescription
general/icmp
Low

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
general/udp
Low
For your information, here is the traceroute to 20.0.0.1 :
20.0.0.2
20.0.0.1