Network Vulnerability Assessment Report
09.02.2005
Sorted by host names

Session name: kvm-aten cn6000Start Time:04.02.2005 13:57:51
Finish Time:04.02.2005 15:27:59
Elapsed:0 day(s) 01:30:08
Total records generated:17
high severity:2
low severity:13
informational:2


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.92132Finished


10.0.0.9

ServiceSeverityDescription
https (443/tcp)
Info
Port is open
www (80/tcp)
Info
Port is open
general/tcp
High

The remote host seems to generate Initial Sequence Numbers (ISN) in a weak
manner which seems to solely depend on the source and dest port of the TCP
packets.

An attacker may exploit this flaw to establish spoofed connections to the
remote host.

The Raptor Firewall and Novell Netwoare are known to be vulnerable to this
flaw, altough other network devices may be vulnerable as well.


Solution :

If you are using a Raptor Firewall, see
http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html

If you are running Novell Netware 6, see:
http://support.novell.com/servlet/tidfinder/2964249


Reference : http://online.securityfocus.com/archive/1/285729

Risk factor : High
CVE : CAN-2002-1463
general/icmp
High

The remote host is vulnerable to an 'Etherleak' -
the remote ethernet driver seems to leak bits of the
content of the memory of the remote operating system.

Note that an attacker may take advantage of this flaw
only when its target is on the same physical subnet.

See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt
Solution : Contact your vendor for a fix
Risk factor : Serious
CVE : CAN-2003-0001
BID : 6535
www (80/tcp)
Low
A web server is running on this port
https (443/tcp)
Low
A web server is running on this port through SSL
https (443/tcp)
Low
A SSLv2 server answered on this port

general/udp
Low
For your information, here is the traceroute to 10.0.0.9 :
10.0.0.201
10.0.0.9

general/tcp
Low

The remote host uses non-random IP IDs, that is, it is
possible to predict the next value of the ip_id field of
the ip packets sent by this host.

An attacker may use this feature to determine traffic patterns
within your network. A few examples (not at all exhaustive) are:

1. A remote attacker can determine if the remote host sent a packet
in reply to another request. Specifically, an attacker can use your
server as an unwilling participant in a blind portscan of another
network.

2. A remote attacker can roughly determine server requests at certain
times of the day. For instance, if the server is sending much more
traffic after business hours, the server may be a reverse proxy or
other remote access device. An attacker can use this information to
concentrate his/her efforts on the more critical machines.

3. A remote attacker can roughly estimate the number of requests that
a web server processes over a period of time.


Solution : Contact your vendor for a patch
Risk factor : Low
https (443/tcp)
Low

This web server is [mis]configured in that it
does not return '404 Not Found' error codes when
a non-existent file is requested, perhaps returning
a site map, search page or authentication page instead.

Nessus enabled some counter measures for that, however
they might be insufficient. If a great number of security
holes are produced for this port, they might not all be accurate
www (80/tcp)
Low

This web server is [mis]configured in that it
does not return '404 Not Found' error codes when
a non-existent file is requested, perhaps returning
a site map, search page or authentication page instead.

Nessus enabled some counter measures for that, however
they might be insufficient. If a great number of security
holes are produced for this port, they might not all be accurate
https (443/tcp)
Low
The remote web server type is :

ATEN HTTP Server(V1.0)


Solution : We recommend that you configure (if possible) your web server to return
a bogus Server header in order to not leak information.

www (80/tcp)
Low
The remote web server type is :

ATEN HTTP Server(V1.0)


Solution : We recommend that you configure (if possible) your web server to return
a bogus Server header in order to not leak information.

https (443/tcp)
Low
Here is the SSLv2 server certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 0 (0x0)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=CA, ST=BC, L=RICHMOND, O=ATEN, OU=Aten, CN=Aten
Validity
Not Before: Nov 25 18:26:42 2003 GMT
Not After : Nov 22 18:26:42 2013 GMT
Subject: C=CA, ST=BC, L=RICHMOND, O=ATEN, OU=Aten, CN=Aten
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)
Modulus (1024 bit):
00:ff:2d:d8:2b:fc:0f:c5:b0:13:c1:1b:f9:c0:c7:
56:e9:07:e9:59:51:d2:b2:e5:db:ae:80:6e:bc:99:
93:b6:72:0a:38:3a:41:f3:07:5d:a7:2d:5a:e4:be:
4b:11:81:64:86:3a:02:db:af:c3:f5:9f:e0:d7:be:
59:f0:42:ba:93:eb:23:f4:32:fd:6c:0b:a1:fb:d7:
f5:15:71:1b:d8:7a:88:f7:c2:7c:b0:e6:85:34:1f:
aa:14:cb:e1:00:23:64:57:62:b5:c7:0c:e1:d0:1c:
57:b8:92:71:d1:ba:9a:c5:4e:a1:70:01:43:97:0c:
cf:48:3c:d3:bc:8c:1e:cb:a3
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
37:DC:A8:8F:91:53:C6:D5:F7:FB:54:DF:60:EE:59:83:99:41:83:C3
X509v3 Authority Key Identifier:
keyid:37:DC:A8:8F:91:53:C6:D5:F7:FB:54:DF:60:EE:59:83:99:41:83:C3
DirName:/C=CA/ST=BC/L=RICHMOND/O=ATEN/OU=Aten/CN=Aten
serial:00

X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: md5WithRSAEncryption
c4:d3:45:85:47:6b:e4:5a:f7:dc:db:4e:73:d7:1e:92:10:7d:
a7:7d:0c:98:f7:ca:8d:28:b0:3a:17:b9:1d:33:5c:04:68:d8:
af:6b:cb:1d:b2:87:ae:c6:eb:1f:f2:26:80:c8:cc:7c:d5:a2:
13:43:27:9b:b6:04:2d:17:68:19:e2:2b:db:da:b0:a6:97:2f:
b5:16:e8:a2:42:0b:b0:3f:24:69:34:87:48:0f:12:b7:11:13:
10:b5:68:05:32:c7:d9:eb:b4:38:c3:36:d2:94:bb:95:ef:1e:
a3:fb:d7:6c:97:99:b6:86:7b:2a:4b:92:b1:6a:b0:7b:00:11:
84:58
Here is the list of available SSLv2 ciphers:
RC4-MD5
EXP-RC4-MD5
RC4-64-MD5
The SSLv2 server offers 2 strong ciphers, but also
0 medium strength and 1 weak "export class" ciphers.
The weak/medium ciphers may be chosen by an export-grade
or badly configured client software. They only offer a
limited protection against a brute force attack

Solution: disable those ciphers and upgrade your client
software if necessary.
See http://support.microsoft.com/default.aspx?scid=kb
en-us
216482
or http://httpd.apache.org/docs-2.0/mod/mod_ssl.html#sslciphersuite
This SSLv2 server also accepts SSLv3 connections.
This SSLv2 server also accepts TLSv1 connections.

general/tcp
Low

The remote host might be vulnerable to a sequence number approximation
bug, which may allow an attacker to send spoofed RST packets to the remote
host and close established connections.

This may cause problems for some dedicated services (BGP, a VPN over
TCP, etc...).

Solution : See http://www.securityfocus.com/bid/10183/solution/
Risk factor : Medium
CVE : CAN-2004-0230
BID : 10183
Other references : OSVDB:4030, IAVA:2004-A-0007
https (443/tcp)
Low

The target host is running a version of osTicket that enables a remote
user to view attachments associated with existing tickets from any user.
These attachments may contain sensitive information.

Solution : Upgrade to osTicket STS 1.2.7 or later.
Risk factor : Low
CVE : CAN-2004-0613
www (80/tcp)
Low

The target host is running a version of osTicket that enables a remote
user to view attachments associated with existing tickets from any user.
These attachments may contain sensitive information.

Solution : Upgrade to osTicket STS 1.2.7 or later.
Risk factor : Low
CVE : CAN-2004-0613