Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Service | Severity | Description |
www (80/tcp) | Port is open | |
www (80/tcp) | The remote host is running ASPrunner prior to version 2.5. There are multiple flaws in this version of ASPrunner which would enable a remote attacker to read and/or modify potentially confidential data. An attacker, exploiting this flaw, would need access to the webserver via the network. Solution : Upgrade to latest version of ASPrunner See also : http://www.securityfocus.com/bid/10799 Risk factor : High BID : 10799 Other references : OSVDB:8251 | |
general/icmp | The remote host is vulnerable to an 'Etherleak' - the remote ethernet driver seems to leak bits of the content of the memory of the remote operating system. Note that an attacker may take advantage of this flaw only when its target is on the same physical subnet. See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt Solution : Contact your vendor for a fix Risk factor : High CVE : CAN-2003-0001 BID : 6535 | |
www (80/tcp) | It seems that your web server tries to hide its version or name, which is a good thing. However, using a special crafted request, Nessus was able to determine that is is running : FLC/0.41 Risk factor : None Solution : Fix your configuration. | |
general/tcp | The remote host does not discard TCP SYN packets which have the FIN flag set. Depending on the kind of firewall you are using, an attacker may use this flaw to bypass its rules. See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html http://www.kb.cert.org/vuls/id/464113 Solution : Contact your vendor for a patch Risk factor : Medium BID : 7487 | |
general/udp | For your information, here is the traceroute to 192.168.1.22 : 192.168.1.37 192.168.1.22 | |
general/tcp | 192.168.1.22 resolves as kruger.dnepr.net.ru. | |
www (80/tcp) | A web server is running on this port | |
www (80/tcp) | This web server is [mis]configured in that it does not return '404 Not Found' error codes when a non-existent file is requested, perhaps returning a site map, search page or authentication page instead. Unfortunately, we were unable to find a way to recognize this page, so some CGI-related checks have been disabled. To work around this issue, please contact the Nessus team. |