Network Vulnerability Assessment Report
08.04.2005
Sorted by host names

Session name: WL-5424ARStart Time:06.04.2005 13:45:15
Finish Time:06.04.2005 13:56:59
Elapsed:0 day(s) 00:11:44
Total records generated:6
high severity:0
Medium severity:1
informational:5


10.0.0.42

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
general/tcp
Medium

The remote host accepts loose source routed IP packets.
The feature was designed for testing purpose.
An attacker may use it to circumvent poorly designed IP filtering
and exploit another flaw. However, it is not dangerous by itself.

Solution : drop source routed packets on this host or on other ingress
routers or firewalls.


Risk factor : Low
www (80/tcp)
Info
The remote web server type is :

IP_SHARER WEB 1.0


Solution : We recommend that you configure (if possible) your web server to return
a bogus Server header in order to not leak information.

general/tcp
Info
10.0.0.42 resolves as Untitled.ixbt.lab.
general/udp
Info
For your information, here is the traceroute to 10.0.0.42 :
10.0.0.61
10.0.0.42

www (80/tcp)
Info
A web server is running on this port