| Network Vulnerability Assessment Report |
| |
| Sorted by host names |
| |||||||||
|
| Host | Holes | Warnings | Open ports | State |
| 10.0.0.40 | 1 | 0 | 2 | Finished |
| Service | Severity | Description |
| snmp (161/udp) | Port is open | |
| omad (32768/udp) | Port is open | |
| snmp (161/udp) | Synopsis : The community name of the remote SNMP server can be guessed. Description : It is possible to obtain the default community names of the remote SNMP server. An attacker may use this information to gain more knowledge about the remote host, or to change the configuration of the remote system (if the default community allow such modifications). Solution : Disable the SNMP service on the remote host if you do not use it, filter incoming UDP packets going to this port, or change the default community string. Risk factor : High Plugin output : The remote SNMP server replies to the following default community strings : private public CVE : CVE-1999-0517, CVE-1999-0186, CVE-1999-0254, CVE-1999-0516 BID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986 Other references : IAVA:2001-B-0001 | |
| snmp (161/udp) | Synopsis : The list of network interfaces cards of the remote host can be obtained via SNMP. Description : It is possible to obtain the list of the network interfaces installed on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.2.1.0 An attacker may use this information to gain more knowledge about the target host. Solution : Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Risk factor : Low Plugin output : Interface 1 information : ifIndex : 1 ifDescr : LOCAL_LOOPBACK ifPhysAddress : 000000000000 Interface 2 information : ifIndex : 2 ifDescr : LAN ifPhysAddress : 0014c1077f53 Interface 3 information : ifIndex : 3 ifDescr : WLAN ifPhysAddress : 0014c1077f55 Interface 4 information : ifIndex : 4 ifDescr : ATM1 ifPhysAddress : 0014c1077f54 | |
| general/icmp | Synopsis : The remote host leaks memory in network packets. Description : The remote host is vulnerable to an 'Etherleak' - the remote ethernet driver seems to leak bits of the content of the memory of the remote operating system. Note that an attacker may take advantage of this flaw only when its target is on the same physical subnet. See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt Solution : Contact your vendor for a fix Risk factor : Low / CVSS Base Score : 2 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N) CVE : CVE-2003-0001 BID : 6535 | |
| general/tcp | Information about this scan : Nessus version : Unknown (NASL_LEVEL=2200) Plugin feed version : 200602130615 Type of plugin feed : Registered (7 days delay) Scanner IP : 10.0.0.59 Port range : 1-1024 Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Max hosts : 16 Max checks : 10 Scan Start Date : 2006/3/7 19:53 Scan duration : 272 sec | |
| snmp (161/udp) | Synopsis : The System Information of the remote host can be obtained via SNMP. Description : It is possible to obtain the system information about the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.1.1. An attacker may use this information to gain more knowledge about the target host. Solution : Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Risk factor : Low Plugin output : System information : sysDescr : Wireless ADSL Gateway sysObjectID : 1.3.6.1.3.9999 sysUptime : 0d 0h 17m 53s sysContact : support@vendor sysName : USR9110 sysLocation : United States sysServices : 79 |