Network Vulnerability Assessment Report
25.02.2005
Sorted by host names

Session name: OvisLink WMU9000VPNStart Time:24.02.2005 15:16:05
Finish Time:24.02.2005 15:30:38
Elapsed:0 day(s) 00:14:33
Total records generated:9
high severity:2
Medium severity:2
informational:5


Scan configuration

Plugins used in this scan

IdName

Preferences settings for this scan

max_hosts 16
max_checks 10
log_whole_attack yes
cgi_path /cgi-bin
port_range 1-1024
optimize_test yes
language english
checks_read_timeout 5
non_simult_ports 139, 445
plugins_timeout 320
safe_checks yes
auto_enable_dependencies no
use_mac_addr no
save_knowledge_base no
kb_restore no
only_test_hosts_whose_kb_we_dont_have no
only_test_hosts_whose_kb_we_have no
kb_dont_replay_scanners no
kb_dont_replay_info_gathering no
kb_dont_replay_attacks no
kb_dont_replay_denials no
kb_max_age 864000
plugin_upload no
plugin_upload_suffixes .nasl, .inc
slice_network_addresses no
ntp_save_sessions yes
ntp_detached_sessions yes
server_info_nessusd_version 2.3.0
server_info_libnasl_version 2.3.0
server_info_libnessus_version 2.3.0
server_info_thread_manager fork
server_info_os Linux
server_info_os_version 2.6.9-deep1
reverse_lookup no
ntp_keep_communication_alive yes
ntp_opt_show_end yes
save_session yes
detached_scan no
continuous_scan no


192.168.1.22

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
www (80/tcp)
High

The remote host is running ASPrunner prior to version 2.5.
There are multiple flaws in this version of ASPrunner which
would enable a remote attacker to read and/or modify potentially
confidential data.

An attacker, exploiting this flaw, would need access to the
webserver via the network.

Solution : Upgrade to latest version of ASPrunner

See also : http://www.securityfocus.com/bid/10799

Risk factor : High
BID : 10799
Other references : OSVDB:8251
general/icmp
High

The remote host is vulnerable to an 'Etherleak' -
the remote ethernet driver seems to leak bits of the
content of the memory of the remote operating system.

Note that an attacker may take advantage of this flaw
only when its target is on the same physical subnet.

See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt
Solution : Contact your vendor for a fix
Risk factor : High
CVE : CAN-2003-0001
BID : 6535
www (80/tcp)
Medium

It seems that your web server tries to hide its version
or name, which is a good thing.
However, using a special crafted request, Nessus was able
to determine that is is running :
FLC/0.41

Risk factor : None
Solution : Fix your configuration.
general/tcp
Medium

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
general/udp
Info
For your information, here is the traceroute to 192.168.1.22 :
192.168.1.37
192.168.1.22

general/tcp
Info
192.168.1.22 resolves as kruger.dnepr.net.ru.
www (80/tcp)
Info
A web server is running on this port
www (80/tcp)
Info

This web server is [mis]configured in that it
does not return '404 Not Found' error codes when
a non-existent file is requested, perhaps returning
a site map, search page or authentication page instead.

Unfortunately, we were unable to find a way to recognize this page,
so some CGI-related checks have been disabled.

To work around this issue, please contact the Nessus team.