Network Vulnerability Assessment Report
29.08.2006
Sorted by host names

Session name: ASUS WL-566gMStart Time:29.08.2006 20:19:19
Finish Time:29.08.2006 20:24:15
Elapsed:0 day(s) 00:04:55
Total records generated:5
high severity:0
Medium severity:0
informational:5


Summary of scanned hosts

HostHolesWarningsOpen portsState
10.0.0.25002Finished


10.0.0.25

ServiceSeverityDescription
domain (53/udp)
Info
Port is open
http-proxy (8080/tcp)
Info
Port is open
general/icmp
Info

Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)

Plugin output :

The difference between the local and remote clock is 58627 seconds

CVE : CVE-1999-0524
general/tcp
Info
Information about this scan :

Nessus version : Unknown (NASL_LEVEL=2200)
Plugin feed version : 200606260815
Type of plugin feed : Registered (7 days delay)
Scanner IP : 10.0.0.59
Port range : 1-1024,8080
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 16
Max checks : 10
Scan Start Date : 2006/8/29 20:19
Scan duration : 310 sec

domain (53/udp)
Info

Synopsis :

Remote DNS server is vulnerable to Cache Snooping attacks.

Description :

The remote DNS server answers to queries for third party domains which do
not have the recursion bit set.

This may allow a remote attacker to determine which domains have recently
been resolved via this name server, and therefore which hosts have been
recently visited.

For instance, if an attacker was interested in whether your company utilizes
the online services of a particular financial institution, they would
be able to use this attack to build a statistical model regarding
company usage of aforementioned financial institution. Of course,
the attack can also be used to find B2B partners, web-surfing patterns,
external mail servers, and more...

For a much more detailed discussion of the potential risks of allowing
DNS cache information to be queried anonymously, please see:
http://community.sidestep.pt/~luis/DNS-Cache-Snooping/DNS_Cache_Snooping_1.1.pdf

Risk factor :

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)