I've just been scanning a freshly-installed Windows Server 2003 (standard)
with IIS and FrontPage installed. I supplied nessus with the SMB
Administrator userid and password, and received many warnings that I suspect
mean that the NASL tests need to be updated to explicitly check for W2003.
Many appear to be looking for hotfix information which has not been set for
Win2003.

These are the tests that I think are wrong:-

NessusID        Test
                Following are reported even without administrator login:-
10394           Login with NULL session (Ethereal trace seems to show
failure, not success)
10859           The Host SID can be obtained remotely (incorrect 0-0-0-0-0
value returned)

                Following are reported if administrator login given:-
11212           The Microsoft Locate service is a name server ... is
vulnerable
11145           Hot fix to fix Certificate Validation Flaw (Q329115) not
installed
10433           The hotfix for the 'IP Fragment Reassembly' vulnerability
has not been applied 
10866           XMLHTTP Control Can Allow Access to Local Files.
11300           The remote host is vulnerable to a denial of service attack,
11147           An unchecked buffer in Windows help could allow an attacker
to gain control
11191           A security issue has been identified in WM_TIMER that could
allow an attacker...
10525           The hotfix for the multiple LPC and LPC Ports
vulnerabilities 
10434           The hotfix for the 'ResetBrowser Frame' and the
'HostAnnouncement flood'
10865           The hotfix for the Unchecked Buffer in SNMP Service 
10486           The hotfix for the 'Relative Shell Path'
10926           Incorrect VBScript Handling in IE can Allow Web 
11029           An overflow in the RAS phonebook service allows a local user
10482           The hotfix for the 'NetBIOS Name Server Protocol Spoofing'
11177           Hotfix to fix Flaw in Microsoft VM could Allow Code
Execution (810030)
11144           A vulnerability in the Certificate Enrollment ActiveX
Control 
11146           Remote Data Protocol (RDP) version 5.0 in 
11583           The remote host is running a version of the shlwapi.dll
which crashes
11215           The SMB signing capability in the Server Message Block
11460           The registry key HKLM\Software\Microsoft\Windows
NT\WinLogon\LogonType
10944           Buffer overflow in Multiple UNC Provider (MUP) in Microsoft
11231           The remote host is vulnerable to a flaw in the RPC
redirector
11306           The remote ASP.NET installation might be vulnerable to a
buffer overflow

See attached text results for full report. I can accept or understand the
other warnings.

Andrew Yeomans ([EMAIL PROTECTED])
Global IT Security Technology, Dresdner Kleinwort Wasserstein
Tel: 020 7475 9086  Mobile: 07967 225095

(Previous post appears to have been lost, apologies if near-duplicate)



----------------------------------------------------------------------
If you have received this e-mail in error or wish to read our e-mail 
disclaimer statement and monitoring policy, please refer to 
http://www.drkw.com/disc/email/ or contact the sender.
----------------------------------------------------------------------

Nessus Scan Report
------------------



SUMMARY

 - Number of hosts which were alive during the test : 1
 - Number of security holes found : 3
 - Number of security warnings found : 8
 - Number of security notes found : 14



TESTED HOSTS

 192.168.254.13 (Security holes found)



DETAILS

+ 192.168.254.13 :
 . List of open ports :
   o http (80/tcp) (Security hole found)
   o loc-srv (135/tcp) (Security warnings found)
   o netbios-ssn (139/tcp) (Security hole found)
   o microsoft-ds (445/tcp) (Security notes found)
   o NFS-or-IIS (1025/tcp) (Security notes found)
   o LSA-or-nterm (1026/tcp) (Security notes found)
   o unknown (1041/tcp) (Security notes found)
   o unknown (8072/tcp) (Security notes found)
   o general/udp (Security notes found)
   o general/tcp (Security warnings found)
   o general/icmp (Security warnings found)
   o netbios-ns (137/udp) (Security warnings found)

 . Vulnerability found on port http (80/tcp) : 


    The remote frontpage server may leak information on the anonymous user
    By knowing the name of the anonymous user, more sophisticated attacks may be
     launched
    Check the following data for any potential leaks:
    
    method=open service:3.0.2.1105
    <p>status=
    <ul>
    <li>status=917505
    <li>osstatus=0
    <li>msg=The user '(unknown)' is not authorized to execute the 'open service'
     method.
    <li>osmsg=
    </ul>
    </body>
    </html>
    1
    
    
    CVE : CAN-2000-0114

 . Vulnerability found on port http (80/tcp) : 


    
    The IIS server appears to have the .SHTML ISAPI filter mapped.
    
    At least one remote vulnerability has been discovered for the
    .SHTML filter. This is detailed in Microsoft Advisory MS02-018
    and results in a denial of service access to the web server. 
    
    It is recommended that even if you have patched this vulnerability that
    you unmap the .SHTML extension, and any other unused ISAPI extensions
    if they are not required for the operation of your site.
    
    An attacker may use this flaw to prevent the remote service
    from working properly.
    
    *** Nessus reports this vulnerability using only
    *** information that was gatherered. Use caution
    *** when testing without safe checks enabled
    
    Solution: See 
    http://www.microsoft.com/technet/security/bulletin/ms02-018.asp
    and/or unmap the shtml/shtm isapi filters.
    
    To unmap the .shtml extension:
     1.Open Internet Services Manager. 
     2.Right-click the Web server choose Properties from the context menu. 
     3.Master Properties 
     4.Select WWW Service -> Edit -> HomeDirectory -> Configuration 
    and remove the reference to .shtml/shtm and sht from the list.
    
    Risk factor : Medium
    CVE : CAN-1999-1376, CVE-2000-0226, CAN-2002-0072
    BID : 4479

 . Warning found on port http (80/tcp)


    
    Asking the main page, a Content-Location header was added to the response.
    By default, in Internet Information Server (IIS) 4.0,
    the Content-Location references the IP address of the server
    rather than the Fully Qualified Domain Name (FQDN) or Hostname.
    
    This header may expose internal IP addresses that are usually hidden or
     masked
    behind a Network Address Translation (NAT) Firewall or proxy server.
    
    Solution: See http://support.microsoft.com/support/kb/articles/Q218/1/80.ASP
    
    Risk factor : Low
    CVE : CAN-2000-0649
    BID : 1499

 . Information found on port http (80/tcp)


    A web server is running on this port

 . Information found on port http (80/tcp)


    The following directories were discovered:
    /_vti_bin, /images

 . Information found on port http (80/tcp)


    The remote web server type is :
    
    Microsoft-IIS/6.0
    
    Solution : You can use urlscan to change reported server for IIS.

 . Information found on port http (80/tcp)


    The address in Content-Location is: 192.168.254.13
    CVE : CAN-2000-0649
    BID : 1499

 . Warning found on port loc-srv (135/tcp)


    
    DCE services running on the remote can be enumerated
    by connecting on port 135 and doing the appropriate
    queries.
    
    An attacker may use this fact to gain more knowledge
    about the remote host.
    
    Solution : filter incoming traffic to this port.
    Risk factor : Low

 . Vulnerability found on port netbios-ssn (139/tcp) : 


    
    . It was possible to log into the remote host using a NULL session.
    The concept of a NULL session is to provide a null username and
    a null password, which grants the user the 'guest' access
    
    To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and
    Q246261 (Windows 2000). 
    Note that this won't completely disable null sessions, but will 
    prevent them from connecting to IPC$
    Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html
    
    . All the smb tests will be done as ''/'' in domain WORKGROUP
    CVE : CAN-1999-0504, CAN-1999-0506, CVE-2000-0222
    BID : 990

 . Warning found on port netbios-ssn (139/tcp)


    The host SID can be obtained remotely. Its value is :
    
     : 0-0-0-0-0
    
    An attacker can use it to obtain the list of the local users of this host
    Solution : filter the ports 137 to 139 and 445
    Risk factor : Low
    
    CVE : CVE-2000-1200
    BID : 959

 . Warning found on port netbios-ssn (139/tcp)


    Here is the browse list of the remote host : 
    
    WIN2003SERVER - 
    
    
    This is potentially dangerous as this may help the attack
    of a potential hacker by giving him extra targets to check for
    
    Solution : filter incoming traffic to this port
    Risk factor : Low
    



 . Information found on port netbios-ssn (139/tcp)


    The remote native lan manager is : Windows Server 2003 5.2
    The remote Operating System is : Windows Server 2003 3790
    The remote SMB Domain Name is : WORKGROUP
    



 . Information found on port microsoft-ds (445/tcp)


    A CIFS server is running on this port

 . Information found on port NFS-or-IIS (1025/tcp)


    Here is the list of DCE services running on this port:
         UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1025]
         Annotation: IPSec Policy agent endpoint
    
         UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1025]
    
    



 . Information found on port LSA-or-nterm (1026/tcp)


    Here is the list of DCE services running on this port:
         UUID: 1ff70682-0a51-30e8-076d-740be8cee98b, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1026]
    
         UUID: 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1026]
    
         UUID: 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1026]
    
    



 . Information found on port unknown (1041/tcp)


    Here is the list of DCE services running on this port:
         UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1041]
    
         UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1041]
    
         UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1041]
    
         UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
         Endpoint: ncacn_ip_tcp:192.168.254.13[1041]
    
    



 . Information found on port unknown (8072/tcp)


    A web server is running on this port

 . Information found on port unknown (8072/tcp)


    The following directories were discovered:
    /help, /images

 . Information found on port unknown (8072/tcp)


    The remote web server type is :
    
    Microsoft-IIS/6.0
    
    Solution : You can use urlscan to change reported server for IIS.

 . Information found on port general/udp


    For your information, here is the traceroute to 192.168.254.13 : 
    192.168.254.13
    



 . Warning found on port general/tcp


    
    The remote host uses non-random IP IDs, that is, it is
    possible to predict the next value of the ip_id field of
    the ip packets sent by this host.
    
    An attacker may use this feature to determine if the remote
    host sent a packet in reply to another request. This may be
    used for portscanning and other things.
    
    Solution : Contact your vendor for a patch
    Risk factor : Low

 . Warning found on port general/tcp


    
    The remote host does not discard TCP SYN packets which
    have the FIN flag set.
    
    Depending on the kind of firewall you are using, an
    attacker may use this flaw to bypass its rules.
    
    See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
               http://www.kb.cert.org/vuls/id/464113
        
    Solution : Contact your vendor for a patch
    Risk factor : Medium
    BID : 7487

 . Information found on port general/tcp


    Remote OS guess : Microsoft Windows.NET Enterprise Server (build 3604-3615
     beta)
    
    CVE : CAN-1999-0454

 . Warning found on port general/icmp


    
    The remote host answers to an ICMP timestamp
    request. This allows an attacker to know the
    date which is set on your machine. 
    
    This may help him to defeat all your 
    time based authentication protocols.
    
    Solution : filter out the ICMP timestamp
    requests (13), and the outgoing ICMP 
    timestamp replies (14).
    
    Risk factor : Low
    CVE : CAN-1999-0524

 . Warning found on port netbios-ns (137/udp)


    . The following 6 NetBIOS names have been gathered :
     WIN2003SERVER   = This is the computer name registered for workstation
     services by a WINS client.
     WORKGROUP       = Workgroup / Domain name
     WIN2003SERVER  
     WORKGROUP       = Workgroup / Domain name (part of the Browser elections)
     WORKGROUP      
       __MSBROWSE__ 
    . The remote host has the following MAC address on its adapter :
       0x00 0x08 0xc7 0xdc 0xb7 0x01 
    
    If you do not want to allow everyone to find the NetBios name
    of your computer, you should filter incoming traffic to this port.
    
    Risk factor : Medium
    CVE : CAN-1999-0621




------------------------------------------------------
This file was generated by the Nessus Security Scanner

Reply via email to