I scanned one of my firewalls just for the fun of it.
We've been using Nessus for scanning a client's network
to prepare for a security audit. Nothing fancy, just
a "default, don't DOS or destroy anything" type of
scan. Thought you all might be interested. Dach CD
1.02 (I updated some packages awhile back, libz...)
It says the WWW server crashed. This is Weblet. It
didn't crash really, it kinda got confused. When I
looked it was running 20 or so servers, a bunch of seds,
and was not responding to requests. I killed a bunch of
processes, then it restarted itself.
Here it is...
Nessus Scan Report
------------------
SUMMARY
- Number of hosts which were alive during the test : 1
- Number of security holes found : 0
- Number of security warnings found : 6
- Number of security notes found : 9
TESTED HOSTS
64.252.129.83 (Security warnings found)
DETAILS
+ 64.252.129.83 :
. List of open ports :
o general/tcp (Security warnings found)
o ssh (22/tcp) (Security warnings found)
o http (80/tcp) (Security warnings found)
o unknown (5901/tcp) (Security warnings found)
o general/udp (Security notes found)
. Warning found on port general/tcp
The remote host uses non-random IP IDs, that is, it
is
possible to predict the next value of the ip_id
field of
the ip packets sent by this host.
An attacker may use this feature to determine if the
remote
host sent a packet in reply to another request. This
may be
used for portscanning and other things.
Solution : Contact your vendor for a patch
Risk factor :
Low
. Information found on port general/tcp
"Default scan" set. nmap will ignore the user
specified port range and scan
only the 1024 first ports and those declared in
nmap-services
. Information found on port general/tcp
Nmap found that this host is running Linux 2.1.122 -
2.2.16
. Warning found on port ssh (22/tcp)
The remote SSH daemon supports connections made
using the version 1.33 and/or 1.5 of the SSH
protocol.
These protocols are not completely cryptographically
safe so they should not be used.
Solution :
If you use OpenSSH, set the option 'Protocol'
to '2'
If you use SSH.com's set the
option 'Ssh1Compatibility' to 'no'
Risk factor :
Low
. Warning found on port ssh (22/tcp)
You are running a version of OpenSSH older than
OpenSSH 3.2.1
A buffer overflow exists in the daemon if AFS is
enabled on
your system, or if the options KerberosTgtPassing or
AFSTokenPassing are enabled. Even in this scenario,
the
vulnerability may be avoided by enabling
UsePrivilegeSeparation.
Versions prior to 2.9.9 are vulnerable to a remote
root
exploit. Versions prior to 3.2.1 are vulnerable to a
local
root exploit.
Solution :
Upgrade to the latest version of OpenSSH
Risk factor :
High
. Information found on port ssh (22/tcp)
a ssh server is running on this
port
. Information found on port ssh (22/tcp)
Remote SSH version :
SSH-1.99-OpenSSH_3.1p1
. Information found on port ssh (22/tcp)
The remote SSH daemon supports the following
versions of the
SSH protocol :
. 1.33
. 1.5
. 1.99
. 2.0
. Warning found on port http (80/tcp)
The port was detected as opened by scanner but is
now closed. The service
was probably crashed by the
scanner
. Information found on port http (80/tcp)
a web server is running on this
port
. Information found on port http (80/tcp)
The remote web server type is :
ShellHTTPD/0.4.1
We recommend that you configure your web server to
return
bogus versions in order to not leak information
. Information found on port http (80/tcp)
For your information, here is the list of CGIs
that are used by the remote host, as well as their
arguments :
Syntax: cginame (arguments [default value])
/cgi-bin/checkfw ( verbose )
/cgi-bin/checkmem ( verbose )
/cgi-bin/checkdisk ( verbose )
/cgi-bin/viewlogs ( messages )
/cgi-bin/viewlogs-www ( sh-httpd.log
)
. Warning found on port unknown (5901/tcp)
The remote server is running VNC.
VNC permits a console to be displayed remotely.
Solution: Disable VNC access from the network by
using a firewall, or stop VNC service if not needed.
Risk factor :
Medium
. Warning found on port unknown (5901/tcp)
Version of VNC Protocol is: RFB 003.003
. Information found on port general/udp
For your information, here is the traceroute to
64.252.129.83 :
192.168.1.254
64.252.129.83
------------------------------------------------------
This file was generated by the Nessus Security Scanner
_______________________________________________________________
Don't miss the 2002 Sprint PCS Application Developer's Conference
August 25-28 in Las Vegas -
http://devcon.sprintpcs.com/adp/index.cfm?source=osdntextlink
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html