Network Vulnerability Assessment Report
15.02.2005
Sorted by host names

Session name: gigabyte gn-b41gStart Time:26.01.2005 17:39:19
Finish Time:26.01.2005 18:36:54
Elapsed:0 day(s) 00:57:34
Total records generated:7
high severity:1
low severity:5
informational:1


Summary of scanned hosts

HostHolesWarningsOpen portsState
192.168.0.254151Finished


192.168.0.254

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
www (80/tcp)
High

The remote ftp.pl cgi can be used to get the listing
of the content of arbitrary directories, using a simple
request like :

http://target/cgi-bin/ftp/ftp.pl?dir=../../../../../../etc


Solution : disable this CGI as no fix is available at this
time (see http://www.feartech.com/vv/ftp.shtml for details
regarding the availability of a patch)

Risk factor : Medium
CVE : CVE-2000-0674
BID : 1471
www (80/tcp)
Low
A web server is running on this port
general/tcp
Low

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
general/icmp
Low
Here is the route recorded between 192.168.0.1 and 192.168.0.254 :
192.168.0.254.
192.168.0.254.

general/icmp
Low

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
general/udp
Low
For your information, here is the traceroute to 192.168.0.254 :
192.168.0.1
192.168.0.254