Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
192.168.0.254 | 1 | 5 | 1 | Finished |
Service | Severity | Description |
www (80/tcp) | Port is open | |
www (80/tcp) | The remote ftp.pl cgi can be used to get the listing of the content of arbitrary directories, using a simple request like : http://target/cgi-bin/ftp/ftp.pl?dir=../../../../../../etc Solution : disable this CGI as no fix is available at this time (see http://www.feartech.com/vv/ftp.shtml for details regarding the availability of a patch) Risk factor : Medium CVE : CVE-2000-0674 BID : 1471 | |
www (80/tcp) | A web server is running on this port | |
general/tcp | The remote host does not discard TCP SYN packets which have the FIN flag set. Depending on the kind of firewall you are using, an attacker may use this flaw to bypass its rules. See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html http://www.kb.cert.org/vuls/id/464113 Solution : Contact your vendor for a patch Risk factor : Medium BID : 7487 | |
general/icmp | Here is the route recorded between 192.168.0.1 and 192.168.0.254 : 192.168.0.254. 192.168.0.254. | |
general/icmp | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : Low CVE : CAN-1999-0524 | |
general/udp | For your information, here is the traceroute to 192.168.0.254 : 192.168.0.1 192.168.0.254 |