Network Vulnerability Assessment Report
11.03.2005
Sorted by host names

Session name: OvisLink_WL-1184ARStart Time:11.03.2005 01:59:33
Finish Time:11.03.2005 02:13:58
Elapsed:0 day(s) 00:14:24
Total records generated:7
high severity:1
Medium severity:1
informational:5


Scan configuration

Plugins used in this scan

IdName

Preferences settings for this scan

max_hosts 16
max_checks 10
log_whole_attack yes
cgi_path /cgi-bin
port_range 1-1024
optimize_test yes
language english
checks_read_timeout 5
non_simult_ports 139, 445
plugins_timeout 320
safe_checks yes
auto_enable_dependencies no
use_mac_addr no
save_knowledge_base no
kb_restore no
only_test_hosts_whose_kb_we_dont_have no
only_test_hosts_whose_kb_we_have no
kb_dont_replay_scanners no
kb_dont_replay_info_gathering no
kb_dont_replay_attacks no
kb_dont_replay_denials no
kb_max_age 864000
plugin_upload no
plugin_upload_suffixes .nasl, .inc
slice_network_addresses no
ntp_save_sessions yes
ntp_detached_sessions yes
server_info_nessusd_version 2.3.0
server_info_libnasl_version 2.3.0
server_info_libnessus_version 2.3.0
server_info_thread_manager fork
server_info_os Linux
server_info_os_version 2.6.9-deep1
reverse_lookup no
ntp_keep_communication_alive yes
ntp_opt_show_end yes
save_session no
detached_scan no
continuous_scan no


192.168.1.22

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
general/tcp
High

The remote host seems to generate Initial Sequence Numbers (ISN) in a weak
manner which seems to solely depend on the source and dest port of the TCP
packets.

An attacker may exploit this flaw to establish spoofed connections to the
remote host.

The Raptor Firewall and Novell Netware are known to be vulnerable to this
flaw, although other network devices may be vulnerable as well.


Solution :

If you are using a Raptor Firewall, see
http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html

Otherwise, contact your vendor for a patch.

Reference : http://online.securityfocus.com/archive/1/285729

Risk factor : High
CVE : CAN-2002-1463
BID : 5387, 8652
general/tcp
Medium

The remote host accepts loose source routed IP packets.
The feature was designed for testing purpose.
An attacker may use it to circumvent poorly designed IP filtering
and exploit another flaw. However, it is not dangerous by itself.

Solution : drop source routed packets on this host or on other ingress
routers or firewalls.


Risk factor : Low
www (80/tcp)
Info
The remote web server type is :

IP_SHARER WEB 1.0


Solution : We recommend that you configure (if possible) your web server to return
a bogus Server header in order to not leak information.

general/tcp
Info
192.168.1.22 resolves as kruger.dnepr.net.ru.
www (80/tcp)
Info
A web server is running on this port
general/udp
Info
For your information, here is the traceroute to 192.168.1.22 :
192.168.1.37
192.168.1.22