Network Vulnerability Assessment Report
07.03.2006
Sorted by host names

Session name: USR9110Start Time:07.03.2006 19:56:58
Finish Time:07.03.2006 20:01:45
Elapsed:0 day(s) 00:04:46
Total records generated:7
high severity:1
Medium severity:0
informational:6


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.40102Finished


10.0.0.40

ServiceSeverityDescription
snmp (161/udp)
Info
Port is open
omad (32768/udp)
Info
Port is open
snmp (161/udp)
High

Synopsis :

The community name of the remote SNMP server can be guessed.

Description :

It is possible to obtain the default community names of the remote
SNMP server.

An attacker may use this information to gain more knowledge about
the remote host, or to change the configuration of the remote
system (if the default community allow such modifications).

Solution :

Disable the SNMP service on the remote host if you do not use it,
filter incoming UDP packets going to this port, or change the
default community string.

Risk factor :

High

Plugin output :

The remote SNMP server replies to the following default community
strings :

private
public

CVE : CVE-1999-0517, CVE-1999-0186, CVE-1999-0254, CVE-1999-0516
BID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986
Other references : IAVA:2001-B-0001
snmp (161/udp)
Info

Synopsis :

The list of network interfaces cards of the remote host can be obtained via
SNMP.

Description :

It is possible to obtain the list of the network interfaces installed
on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.2.1.0

An attacker may use this information to gain more knowledge about
the target host.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

Risk factor :

Low

Plugin output :

Interface 1 information :
ifIndex : 1
ifDescr : LOCAL_LOOPBACK
ifPhysAddress : 000000000000

Interface 2 information :
ifIndex : 2
ifDescr : LAN
ifPhysAddress : 0014c1077f53

Interface 3 information :
ifIndex : 3
ifDescr : WLAN
ifPhysAddress : 0014c1077f55

Interface 4 information :
ifIndex : 4
ifDescr : ATM1
ifPhysAddress : 0014c1077f54


general/icmp
Info

Synopsis :

The remote host leaks memory in network packets.

Description :

The remote host is vulnerable to an 'Etherleak' - the remote
ethernet driver seems to leak bits of the content of the memory
of the remote operating system.

Note that an attacker may take advantage of this flaw only when
its target is on the same physical subnet.

See also :

http://www.atstake.com/research/advisories/2003/a010603-1.txt

Solution :

Contact your vendor for a fix

Risk factor :

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
CVE : CVE-2003-0001
BID : 6535
general/tcp
Info
Information about this scan :

Nessus version : Unknown (NASL_LEVEL=2200)
Plugin feed version : 200602130615
Type of plugin feed : Registered (7 days delay)
Scanner IP : 10.0.0.59
Port range : 1-1024
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 16
Max checks : 10
Scan Start Date : 2006/3/7 19:53
Scan duration : 272 sec

snmp (161/udp)
Info

Synopsis :

The System Information of the remote host can be obtained via SNMP.

Description :

It is possible to obtain the system information about the remote
host by sending SNMP requests with the OID 1.3.6.1.2.1.1.1.

An attacker may use this information to gain more knowledge about
the target host.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

Risk factor :

Low

Plugin output :

System information :
sysDescr : Wireless ADSL Gateway
sysObjectID : 1.3.6.1.3.9999
sysUptime : 0d 0h 17m 53s
sysContact : support@vendor
sysName : USR9110
sysLocation : United States
sysServices : 79