Network Vulnerability Assessment Report
27.03.2006
Sorted by host names

Session name: D-Link_DSL-G804VStart Time:27.03.2006 18:48:53
Finish Time:27.03.2006 18:59:28
Elapsed:0 day(s) 00:10:34
Total records generated:8
high severity:0
Medium severity:1
informational:7


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.68012Finished


10.0.0.68

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
telnet (23/tcp)
Info
Port is open
telnet (23/tcp)
Medium

Synopsis :

A telnet server is listening on the remote port

Description :

The remote host is running a telnet server.
Using telnet is not recommended as logins, passwords and commands
are transferred in clear text.

An attacker may eavesdrop on a telnet session and obtain the
credentials of other users.

Solution :

Disable this service and use SSH instead

Risk factor :

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Plugin output:

Remote telnet banner:




Login:
general/udp
Info
For your information, here is the traceroute from 10.0.0.59 to 10.0.0.68 :
10.0.0.59
10.0.0.68

telnet (23/tcp)
Info
The Telnet service is running.
This service is dangerous in the sense that it is not ciphered - that is,
everyone can sniff the data that passes between the telnet client
and the telnet server. This includes logins and passwords.


Solution:
If you are running a Unix-type system, OpenSSH can be used instead of telnet.
For Unix systems, you can comment out the 'telnet' line in /etc/inetd.conf.
For Unix systems which use xinetd, you will need to modify the telnet services
file in the /etc/xinetd.d folder. After making any changes to xinetd or
inetd configuration files, you must restart the service in order for the
changes to take affect.

In addition, many different router and switch manufacturers support SSH as a
telnet replacement. You should contact your vendor for a solution which uses
an encrypted session.


Risk factor : Low
CVE : CVE-1999-0619
www (80/tcp)
Info
A web server is running on this port
general/tcp
Info
Information about this scan :

Nessus version : Unknown (NASL_LEVEL=2200)
Plugin feed version : 200602130615
Type of plugin feed : Registered (7 days delay)
Scanner IP : 10.0.0.59
Port range : 1-1024
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 16
Max checks : 10
Scan Start Date : 2006/3/27 18:44
Scan duration : 609 sec

telnet (23/tcp)
Info
A telnet server seems to be running on this port