On Tue, Jun 10, 2003 at 05:27:24PM +0100, Yeomans, Andrew wrote:
> Much better results with smb_nt_ms03-005.nasl version 1.3!
> All the reports of hotfixes not being applied went away.
>
> I think some tests still wrongly report vulnerabilities, though.
> In particular I'm inclined to disbelieve the following three reports:-
>
> 1 Vulnerability found on port netbios-ssn (139/tcp) :
>
> It was possible to log into the remote host using a NULL session.
> The concept of a NULL session is to provide a null username and
> a null password, which grants the user the 'guest' access
>
> To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and
> Q246261 (Windows 2000).
> Note that this won't completely disable null sessions, but will
> prevent them from connecting to IPC$
> Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html
Null sessions are still enabled with Win2003 - you can't do much through
them though (it's not even possible to enumerate the list of users any
more), but it's not a false positive.
> 2 Vulnerability found on port netbios-ssn (139/tcp) :
>
> The Microsoft Locate service is a name server that maps logical
> names to network-specific names.
False positive, fixed.
> 3 Warning found on port netbios-ssn (139/tcp)
>
> The remote host is running a version of the shlwapi.dll which crashes
> when processing a malformed HTML form.
Officially, the flaw has not been fixed yet (in any version of Windows).
> Also the following shouldn't be an issue on Win2003, is it possible for the
> test to check better on Win2003?
Fixed.
-- Renaud