Network Vulnerability Assessment Report
17.02.2006
Sorted by host names

Session name: USR9108Start Time:17.02.2006 21:28:20
Finish Time:17.02.2006 21:48:43
Elapsed:0 day(s) 00:20:23
Total records generated:25
high severity:2
Medium severity:1
informational:22


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.56216Finished


10.0.0.56

ServiceSeverityDescription
ftp (21/tcp)
Info
Port is open
ssh (22/tcp)
Info
Port is open
telnet (23/tcp)
Info
Port is open
www (80/tcp)
Info
Port is open
tftp (69/udp)
Info
Port is open
snmp (161/udp)
Info
Port is open
snmp (161/udp)
High

Synopsis :

The community name of the remote SNMP server can be guessed.

Description :

It is possible to obtain the default community names of the remote
SNMP server.

An attacker may use this information to gain more knowledge about
the remote host, or to change the configuration of the remote
system (if the default community allow such modifications).

Solution :

Disable the SNMP service on the remote host if you do not use it,
filter incoming UDP packets going to this port, or change the
default community string.

Risk factor :

High

Plugin output :

The remote SNMP server replies to the following default community
strings :

private
public

CVE : CVE-1999-0517, CVE-1999-0186, CVE-1999-0254, CVE-1999-0516
BID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986
Other references : IAVA:2001-B-0001
ssh (22/tcp)
High

The remote host is running Dropbear prior to version 0.43.
There is a flaw in this version of Dropbear which would
enable a remote attacker to gain control of the system
from a remote location.

Solution : Upgrade to at least version 0.43 of Dropbear.

See also : http://matt.ucc.asn.au/dropbear/CHANGES

Risk factor : High
CVE : CVE-2004-2486
BID : 10803
Other references : OSVDB:8137
telnet (23/tcp)
Medium

Synopsis :

A telnet server is listening on the remote port

Description :

The remote host is running a telnet server.
Using telnet is not recommended as logins, passwords and commands
are transferred in clear text.

An attacker may eavesdrop on a telnet session and obtain the
credentials of other users.

Solution :

Disable this service and use SSH instead

Risk factor :

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Plugin output:

Remote telnet banner:
U.S. Robotics ADSL Wireless Gateway

Login:
tftp (69/udp)
Info

Synopsis :

A TFTPD server is listening on the remote port.

Description :

The remote host is running a TFTPD (Trivial File Transfer Protocol).
TFTPD is often used by routers and diskless hosts to retrieve their
configuration. It is also used by worms to propagage.

Solution :

If you do not use this service, you should disable it.

Risk factor :

None
CVE : CVE-1999-0616
general/udp
Info
For your information, here is the traceroute from 10.0.0.59 to 10.0.0.56 :
10.0.0.59
10.0.0.56

ssh (22/tcp)
Info
An ssh server is running on this port
snmp (161/udp)
Info

Synopsis :

The list of network interfaces cards of the remote host can be obtained via
SNMP.

Description :

It is possible to obtain the list of the network interfaces installed
on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.2.1.0

An attacker may use this information to gain more knowledge about
the target host.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

Risk factor :

Low

Plugin output :

Interface 1 information :
ifIndex : 1
ifDescr : lo
ifPhysAddress :

Interface 2 information :
ifIndex : 2
ifDescr : atm0
ifPhysAddress : 5ec000000000

Interface 3 information :
ifIndex : 3
ifDescr : cpcs0
ifPhysAddress : 0cde00000000

Interface 4 information :
ifIndex : 4
ifDescr : dsl0
ifPhysAddress : 0cde00000000

Interface 5 information :
ifIndex : 5
ifDescr : eth0
ifPhysAddress : 0014c1048f09

Interface 6 information :
ifIndex : 6
ifDescr : wl0
ifPhysAddress : 0014c1048f08

Interface 7 information :
ifIndex : 7
ifDescr : br0
ifPhysAddress : 0014c1048f08

Interface 8 information :
ifIndex : 8
ifDescr : nas_0_33
ifPhysAddress : 0014c1048f0a


general/icmp
Info

Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)
CVE : CVE-1999-0524
www (80/tcp)
Info
A web server is running on this port
ftp (21/tcp)
Info
An FTP server is running on this port.
Here is its banner :
220 Ftp firmware update utility

www (80/tcp)
Info
An HTTP proxy is running on this port
ftp (21/tcp)
Info

Synopsis :

A FTP server is listening on this port

Description :

It is possible to obtain the banner of the remote FTP server
by connecting to the remote port.

Risk factor :

None

Plugin output :

The remote FTP banner is :
220 Ftp firmware update utility

ssh (22/tcp)
Info
Remote SSH version : SSH-2.0-dropbear_0.36


general/tcp
Info
Nessus was not able to reliably identify the remote operating system. It might be:
Infoblox DNSone
MikroTik Router
The fingerprint differs from these known signatures on 2 points.
If you know what operating system this host is running, please send this signature to
os-signatures@nessus.org :
:1:1:0:64:1:64:1:0:64:1:0:64:1:>64:64:0:1:1:2:1:1:1:1:0:64:5792:MSTNW:7:1:1
($Revision: 1.121 $)
snmp (161/udp)
Info

Synopsis :

The System Information of the remote host can be obtained via SNMP.

Description :

It is possible to obtain the system information about the remote
host by sending SNMP requests with the OID 1.3.6.1.2.1.1.1.

An attacker may use this information to gain more knowledge about
the target host.

Solution :

Disable the SNMP service on the remote host if you do not use it,
or filter incoming UDP packets going to this port.

Risk factor :

Low

Plugin output :

System information :
sysDescr : Broadcom Bcm963xx Software Version 1001_061305-3.00L.03.
sysObjectID : 1.3.6.1.4.1.4413.2.10
sysUptime : 0d 0h 3m 47s
sysContact : unknown
sysName : USRobotics
sysLocation : unknown
sysServices : 72


www (80/tcp)
Info
The remote web server type is :

micro_httpd


telnet (23/tcp)
Info
The Telnet service is running.
This service is dangerous in the sense that it is not ciphered - that is,
everyone can sniff the data that passes between the telnet client
and the telnet server. This includes logins and passwords.


Solution:
If you are running a Unix-type system, OpenSSH can be used instead of telnet.
For Unix systems, you can comment out the 'telnet' line in /etc/inetd.conf.
For Unix systems which use xinetd, you will need to modify the telnet services
file in the /etc/xinetd.d folder. After making any changes to xinetd or
inetd configuration files, you must restart the service in order for the
changes to take affect.

In addition, many different router and switch manufacturers support SSH as a
telnet replacement. You should contact your vendor for a solution which uses
an encrypted session.


Risk factor : Low
CVE : CVE-1999-0619
telnet (23/tcp)
Info
A telnet server seems to be running on this port
general/tcp
Info
Information about this scan :

Nessus version : Unknown (NASL_LEVEL=2200)
Plugin feed version : 200602130615
Type of plugin feed : Registered (7 days delay)
Scanner IP : 10.0.0.59
Port range : 1-1024
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 16
Max checks : 10
Scan Start Date : 2006/2/17 21:25
Scan duration : 1209 sec