Network Vulnerability Assessment Report
13.02.2007
Sorted by host names

Session name: es-305Start Time:08.02.2007 16:59:19
Finish Time:08.02.2007 17:09:11
Elapsed:0 day(s) 00:09:52
Total records generated:8
high severity:0
Medium severity:0
informational:8


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.100003Finished


10.0.0.100

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
domain (53/udp)
Info
Port is open
telnet (23/tcp)
Info
Port is open
telnet (23/tcp)
Info
A telnet server seems to be running on this port
www (80/tcp)
Info
An unknown service is running on this port.
It is usually reserved for HTTP
domain (53/udp)
Info
The remote name server could be fingerprinted as being : dnsmasq 1.13

general/icmp
Info

Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)

Plugin output :

The difference between the local and remote clocks is 41844 seconds

CVE : CVE-1999-0524
domain (53/udp)
Info

A DNS server is running on this port. If you do not use it, disable it.

Risk factor : Low