Hi,
 I am system administrator of Pontificia Universidad Catolica del Peru. We
use Nessus 3.0.6 for Linux (free version) in our servers. 
 When we scan a web server with :
- Red Hat 5 (64 bits)
- php-5.1.6-20.el5_2.1
- Apache: httpd-2.2.3-11.el5_1.3

and the nessus report shows some critical vulnerabilities in php and
suggests update the version of php (The attach "output.prueba.20080725"
shows the results).

After that, we reported this to Red Hat support and they told us that this
scanner has an approach which not checking individual security
vulnerabilities and because of this it can produce some false positives.
Because of this, we want to know if this Nessus version is compatible with
RedHat 5 (64 bits) and we appreciate you can confirm if these results are
false positives or not.

 Thank you very much for your help.

 Regards,
 
****************************************
    Gisella Linares Chong
Oficina de Soporte Informatico
Direccion de Informatica - PUCP
  Telef: 626-2000 anexo 3378
http://dirinfo.pucp.edu.pe
****************************************
 
Title: Nessus Scan Report
Nessus Scan Report
This report gives details on hosts that were tested and issues that were found. Please follow the recommended steps and procedures to eradicate these threats.

Scan Details
Hosts which were alive and responding during test 1
Number of security holes found 5
Number of security warnings found 1


Host List
Host(s) Possible Issue
hermes4.pucp.edu.pe Security hole(s) found
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
hermes4.pucp.edu.pe ssh (22/tcp) Security notes found
hermes4.pucp.edu.pe ntp (123/udp) Security notes found
hermes4.pucp.edu.pe ha-cluster (694/udp) Security notes found
hermes4.pucp.edu.pe sunrpc (111/udp) Security notes found
hermes4.pucp.edu.pe general/udp Security notes found
hermes4.pucp.edu.pe general/tcp Security notes found
hermes4.pucp.edu.pe general/icmp Security notes found
hermes4.pucp.edu.pe http (80/tcp) Security hole found
hermes4.pucp.edu.pe sunrpc (111/tcp) Security notes found
hermes4.pucp.edu.pe uuidgen (697/tcp) Security notes found
hermes4.pucp.edu.pe mysql (3306/tcp) Security notes found


Security Issues and Fixes: hermes4.pucp.edu.pe
Type Port Issue and Fix
Informational ssh (22/tcp) An ssh server is running on this port
Nessus ID : 10330
Informational ssh (22/tcp)
Synopsis :

An SSH server is running on the remote host.

Description :

This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.

Risk factor :

None

Plugin output :

The remote SSH daemon supports the following versions of the
SSH protocol :

. 1.99
. 2.0


SSHv2 host key fingerprint : f2:01:2a:fb:d0:df:09:ea:50:8b:df:11:27:78:73:c0

Nessus ID : 10881
Informational ssh (22/tcp)
Synopsis :

An SSH server is listening on this port.

Description :

It is possible to obtain information about the remote SSH
server by sending an empty authentication request.

Risk factor :

None

Plugin output :

SSH version : SSH-2.0-OpenSSH_4.3
SSH supported authentication : publickey,gssapi-with-mic,password

Nessus ID : 10267
Informational ntp (123/udp)
Synopsis :

An NTP server is listening on the remote host.

Description :

An NTP (Network Time Protocol) server is listening on this port.
It provides information about the current date and time of the
remote system and may provide system information.

Risk factor :

None
Nessus ID : 10884
Informational ha-cluster (694/udp)
Synopsis :

An ONC RPC service is running on the remote host.

Description :

By sending a DUMP request to the portmapper it was possible to
enumerate the ONC RPC services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port.

Risk factor :

None

Plugin output :

The following RPC services are available on UDP port 694 :

- program: 100024 (status), version: 1

Nessus ID : 11111
Informational sunrpc (111/udp)
Synopsis :

An ONC RPC service is running on the remote host.

Description :

By sending a DUMP request to the portmapper it was possible to
enumerate the ONC RPC services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port.

Risk factor :

None

Plugin output :

The following RPC services are available on UDP port 111 :

- program: 100000 (portmapper), version: 2

Nessus ID : 11111
Informational general/udp For your information, here is the traceroute from 200.16.1.240 to 200.16.5.219 :
200.16.1.240
200.16.1.225
200.16.5.219

Nessus ID : 10287
Informational general/tcp
Synopsis :

The remote service implements TCP timestamps.

Description :

The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.

See also :

http://www.ietf.org/rfc/rfc1323.txt

Risk factor :

None
Nessus ID : 25220
Informational general/tcp Information about this scan :

Nessus version : 3.0.6 (Nessus 3.2.1 is available - consider upgrading)

Plugin feed version : 200807241934
Type of plugin feed : Registered (7 days delay)

This scanner is using the Registered Feed which is going to be
discontinued on July 31st.

Please read http://www.nessus.org/products/directfeed/change.php

Scanner IP : 200.16.1.240
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
Max hosts : 20
Max checks : 4
Recv timeout : 5
Scan Start Date : 2008/7/25 12:48
Scan duration : 70 sec

Nessus ID : 19506
Informational general/tcp
Remote operating system : Linux Kernel 2.6
Confidence Level : 65
Method : SinFP


The remote host is running Linux Kernel 2.6
Nessus ID : 11936
Informational general/tcp 200.16.5.219 resolves as hermes4.pucp.edu.pe.
Nessus ID : 12053
Informational general/icmp
Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date which is set on your machine.

This may help him to defeat all your time based authentication
protocols.

Solution :

Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None

Plugin output :

The remote clock is synchronized with the local clock.

CVE : CVE-1999-0524
Nessus ID : 10114
Vulnerability http (80/tcp)
Synopsis :

The remote web server uses a version of PHP that is affected by
multiple flaws.

Description :

According to its banner, the version of PHP installed on the remote
host is older than 5.2.6. Such versions may be affected by the
following issues :

- A stack buffer overflow in FastCGI SAPI.

- An integer overflow in printf().

- An security issue arising from improper calculation
of the length of PATH_TRANSLATED in cgi_main.c.

- A safe_mode bypass in cURL.

- Incomplete handling of multibyte chars inside
escapeshellcmd().

- Issues in the bundled PCRE fixed by version 7.6.

See also :

http://archives.neohapsis.com/archives/bugtraq/2008-03/0321.html
http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0103.html
http://archives.neohapsis.com/archives/fulldisclosure/2008-05/0107.html
http://www.php.net/releases/5_2_6.php

Solution :

Upgrade to PHP version 5.2.6 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Plugin output :

PHP version PHP/5.1.6 appears to be running on the remote host
based on the following Server response header :

Server: Apache

CVE : CVE-2007-4850, CVE-2008-0599, CVE-2008-1384, CVE-2008-2050, CVE-2008-2051
BID : 27413, 28392, 29009
Other references : OSVDB:43219, Secunia:30048
Nessus ID : 32123
Vulnerability http (80/tcp)
Synopsis :

The remote web server uses a version of PHP that is affected by
multiple buffer overflows.

Description :

According to its banner, the version of PHP installed on the remote
host is older than 5.2. Such versions may be affected by several
buffer overflows.

To exploit these issues, an attacker would need the ability to upload
an arbitrary PHP script on the remote server, or to be able to
manipulate several variables processed by some PHP functions such as
htmlentities().

See also :

http://www.php.net/releases/5_2_0.php

Solution :

Upgrade to PHP version 5.2.0 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE : CVE-2006-5465
BID : 20879
Other references : OSVDB:30178, OSVDB:30179
Nessus ID : 31649
Vulnerability http (80/tcp)
Synopsis :

The remote web server uses a version of PHP that is affected by
multiple flaws.

Description :

According to its banner, the version of PHP installed on the remote
host is older than 5.2.1. Such versions may be affected by several
issues, including buffer overflows, format string vulnerabilities,
arbitrary code execution, 'safe_mode' and 'open_basedir' bypasses, and
clobbering of super-globals.

See also :

http://www.php.net/releases/5_2_1.php

Solution :

Upgrade to PHP version 5.2.1 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE : CVE-2006-6383, CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1380, CVE-2007-1453, CVE-2007-1700, CVE-2007-1701, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1886, CVE-2007-1887, CVE-2007-1890
BID : 21508, 22496, 22805, 22806, 22862, 22922, 23119, 23120, 23219, 23233, 23234, 23235, 23236, 23237, 23238
Other references : OSVDB:32776, OSVDB:32781, OSVDB:33955, OSVDB:34767
Nessus ID : 24907
Vulnerability http (80/tcp)
Synopsis :

The remote web server uses a version of PHP that is affected by
multiple flaws.

Description :

According to its banner, the version of PHP installed on the remote
host is older than 5.2.4. Such versions may be affected by various
issues, including but not limited to several overflows.

See also :

http://www.php.net/releases/5_2_4.php

Solution :

Upgrade to PHP version 5.2.4 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE : CVE-2007-2872, CVE-2007-3378, CVE-2007-3806
BID : 24661, 24261, 24922, 25498
Nessus ID : 25971
Vulnerability http (80/tcp)
Synopsis :

The remote web server uses a version of PHP that is affected by
multiple flaws.

Description :

According to its banner, the version of PHP installed on the remote
host is older than 5.2.5. Such versions may be affected by various
issues, including but not limited to several buffer overflows.

See also :

http://www.php.net/releases/5_2_5.php

Solution :

Upgrade to PHP version 5.2.5 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE : CVE-2007-4887, CVE-2007-5898, CVE-2007-5900
BID : 26403
Other references : OSVDB:38680, OSVDB:38681, OSVDB:38682, OSVDB:38683, OSVDB:38684, OSVDB:38685
Nessus ID : 28181
Warning http (80/tcp)
Synopsis :

The remote web server uses a version of PHP that is affected by
multiple flaws.

Description :

According to its banner, the version of PHP installed on the remote
host is older than 5.2.3. Such versions may be affected by several
issues, including an integer overflow, 'safe_mode' and 'open_basedir'
bypass, and a denial of service vulnerability.

See also :

http://www.php.net/releases/5_2_3.php

Solution :

Upgrade to PHP version 5.2.3 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE : CVE-2007-1900, CVE-2007-2756, CVE-2007-2872, CVE-2007-3007
BID : 23359, 24089, 24259, 24261
Other references : OSVDB:33962, OSVDB:35788, OSVDB:36083, OSVDB:36084, OSVDB:36643
Nessus ID : 25368
Informational http (80/tcp) A web server is running on this port
Nessus ID : 10330
Informational http (80/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem

Solution :

None.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : no
Pipelining : no
Keep-Alive : no
Options allowed : GET,HEAD,POST,OPTIONS,TRACE
Headers :

Date: Fri, 25 Jul 2008 17:49:10 GMT
Server: Apache
X-Powered-By: PHP/5.1.6
Content-Length: 68
Connection: close
Content-Type: text/html; charset=ISO-8859-1


Nessus ID : 24260
Informational http (80/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Apache

and the 'ServerTokens' directive is ProductOnly
Apache does not offer a way to hide the server type.

Nessus ID : 10107
Informational http (80/tcp) The following CGI have been discovered :

Syntax : cginame (arguments [default value])

/manual/style/ (C=M;O [A] C=N;O [D] C=S;O [A] C=D;O [A] )
/manual/images/ (C=M;O [A] C=N;O [D] C=S;O [A] C=D;O [A] )
/idea/ (lin_proy_tambo.htm [] pub_electro.htm [] contacto.htm [] e...)
/manual/style/css/ (C=M;O [A] C=N;O [D] C=S;O [A] C=D;O [A] )


Directory index found at /manual/style/css/
Directory index found at /manual/style/
Directory index found at /manual/images/

Nessus ID : 10662
Informational http (80/tcp)
Synopsis :

It is possible to enumerate web directories.

Description :

This plugin attempts to determine the presence of various
common dirs on the remote web server.

Risk factor :

None

Plugin output :

The following directories were discovered:
/webstats, /error, /icons, /idea, /img, /manual

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

Other references : OWASP:OWASP-CM-006
Nessus ID : 11032
Informational sunrpc (111/tcp)
Synopsis :

An ONC RPC portmapper is running on the remote host.

Description :

The RPC portmapper is running on this port.

The portmapper allows to get the port number of each RPC service
running on the remote host either by sending multiple lookup
requests or by sending a DUMP request.

Risk factor :

None
Nessus ID : 10223
Informational sunrpc (111/tcp)
Synopsis :

An ONC RPC service is running on the remote host.

Description :

By sending a DUMP request to the portmapper it was possible to
enumerate the ONC RPC services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port.

Risk factor :

None

Plugin output :

The following RPC services are available on TCP port 111 :

- program: 100000 (portmapper), version: 2

Nessus ID : 11111
Informational uuidgen (697/tcp)
Synopsis :

An ONC RPC service is running on the remote host.

Description :

By sending a DUMP request to the portmapper it was possible to
enumerate the ONC RPC services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port.

Risk factor :

None

Plugin output :

The following RPC services are available on TCP port 697 :

- program: 100024 (status), version: 1

Nessus ID : 11111
Informational mysql (3306/tcp) A MySQL server seems to be running on this port but it
rejects connection from the Nessus scanner.
Nessus ID : 17975
Informational mysql (3306/tcp)
Synopsis :

A database server is listening on the remote port.

Description :

The remote host is running MySQL, an open-source database server. The
remote database access is restricted and configured to reject access
from not allowed IPs. Therefore it was not possible to extract its
version number.

Risk factor :

None
Nessus ID : 10719

This file was generated by Nessus, the security scanner.
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to