Opevas Sample Report
Opevas Sample Report
Opevas Sample Report
Scan Details
Hosts which were alive and responding
6
during test
Number of security holes found 11
Number of security warnings found 26
Number of security notes found 110
Number of false positives found 0
Host List
Host(s) Possible Issue
192.168.1.110 Security hole(s) found
Security warning(s)
192.168.1.111
found
192.168.1.112 Security note(s) found
192.168.1.113 Security hole(s) found
Security warning(s)
192.168.1.114
found
192.168.1.115 Security hole(s) found
[ return to top ]
Analysis of Host
Address of
Port/Service Issue regarding Port
Host
Security note(s)
192.168.1.110 smtp (25/tcp)
found
Security hole(s)
192.168.1.110 http (80/tcp)
found
Security warning(s)
192.168.1.110 epmap (135/tcp)
found
192.168.1.110 netbios-ssn (139/tcp) Security note(s)
found
192.168.1.110 https (443/tcp) No Information
microsoft-ds Security note(s)
192.168.1.110
(445/tcp) found
Security note(s)
192.168.1.110 blackjack (1025/tcp)
found
Security note(s)
192.168.1.110 cap (1026/tcp)
found
Security note(s)
192.168.1.110 exosee (1027/tcp)
found
192.168.1.110 tip2 (3372/tcp) No Information
Security note(s)
192.168.1.110 general/tcp
found
192.168.1.110 ssh (22/tcp) No Information
Security warning(s)
192.168.1.110 netbios-ns (137/udp)
found
Security note(s)
192.168.1.110 general/SMB
found
Security note(s)
192.168.1.110 ms-lsa (1028/udp)
found
Security note(s)
192.168.1.110 iad1 (1030/udp)
found
Security note(s)
192.168.1.110 general/SMBClient
found
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10263
Vulnerability http (80/tcp)
The remote IIS server allows anyone to
execute arbitrary commands
by adding a unicode representation for the
slash character
in the requested path.
Solution: See
http://www.microsoft.com/technet/security/bu
lletin/ms00-078.mspx
Risk factor : High
CVE : CVE-2000-0884
BID : 1806
Other references : IAVA:2000-a-0005
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10537
Warning http (80/tcp) This IIS Server appears to vulnerable to one
of the cross site scripting
attacks described in MS02-018. The default
'404' file returned by IIS uses scripting to
output a link to
top level domain part of the url requested. By
crafting a particular URL it is possible to
insert arbitrary script into the
page for execution.
References:
http://www.microsoft.com/technet/security/bu
lletin/MS02-018.mspx
http://jscript.dk/adv/TL001/
Microsoft-IIS/5.0
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10107
Informational http (80/tcp)
Synopsis :
Description :
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Plugin output :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11874
Informational http (80/tcp)
Synopsis :
Description :
Solution :
Risk factor :
Description :
See also :
http://online.securityfocus.com/archive/1/181
109
Risk factor :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10394
Informational blackjack Distributed Computing Environment (DCE)
(1025/tcp) services running on the remote host
can be enumerated by connecting on port 135
and doing the appropriate queries.
UUID: 906b0ce0-c70b-1067-b317-
00dd010662da, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1025]
UUID: 906b0ce0-c70b-1067-b317-
00dd010662da, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1025]
UUID: 906b0ce0-c70b-1067-b317-
00dd010662da, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1025]
UUID: 906b0ce0-c70b-1067-b317-
00dd010662da, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1025]
UUID: 1ff70682-0a51-30e8-076d-
740be8cee98b, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1026]
Named pipe : atsvc
Win32 service or process : mstask.exe
Description : Scheduler service
UUID: 378e52b0-c0a9-11cf-822d-
00aa0051e40f, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1026]
Solution : filter incoming traffic to this port.
Risk factor : Low
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10736
Informational exosee Distributed Computing Environment (DCE)
(1027/tcp) services running on the remote host
can be enumerated by connecting on port 135
and doing the appropriate queries.
UUID: 82ad4280-036b-11cf-972c-
00aa006887b0, version 2
Endpoint: ncacn_ip_tcp:192.168.1.110[1027]
UUID: 8cfb5d70-31a4-11cf-a7d8-
00805f48a135, version 3
Endpoint: ncacn_ip_tcp:192.168.1.110[1027]
UUID: bfa951d1-2f0e-11d3-bfd1-
00c04fa3490a, version 1
Endpoint: ncacn_ip_tcp:192.168.1.110[1027]
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/tcp Nikto could not be found in your system path.
OpenVAS was unable to execute Nikto and to
perform the scan you
requested.
Please make sure that Nikto is installed and
that nikto.pl or nikto is
available in the PATH variable defined for
your environment.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.14260
Informational general/tcp Information about this scan :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506
Warning netbios-ns The following 5 NetBIOS names have been
(137/udp) gathered :
TRAINING1
WORKGROUP = Workgroup / Domain name
TRAINING1 = This is the computer name
WORKGROUP = Workgroup / Domain name
(part of the Browser elections)
TRAINING1 = This is the current logged in
user or registered workstation name.
The remote host has the following MAC
address on its adapter :
00:0c:29:64:44:7b
CVE : CVE-2008-0087
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90020
Informational general/SM WINNT\system32\Dnsapi.dll not found/no
B access -> Domain=[WORKGROUP]
OS=[Windows 5.0] Server=[Windows 2000
LAN Manager]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2008-0087
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90020
Informational general/SM .NET V2xx not found/no access ->
B Domain=[WORKGROUP] OS=[Windows
5.0] Server=[Windows 2000 LAN Manager]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-0043
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90010
Informational general/SM .NET V2xx not found/no access ->
B
CVE : CVE-2007-0043
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90010
Informational general/SM WINNT\system32\Msjint40.dll not found/no
B access -> Domain=[WORKGROUP]
OS=[Windows 5.0] Server=[Windows 2000
LAN Manager]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINNT\system32\Msjet40.dll not found/no
B access -> Domain=[WORKGROUP]
OS=[Windows 5.0] Server=[Windows 2000
LAN Manager]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINNT\system32\Msjet40.dll not found/no
B access ->
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINNT\system32\Msjint40.dll not found/no
B access ->
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINNT\system32\Msjet40.dll not found/no
B access ->
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINNT\system32\Msjet40.dll not found/no
B access -> Domain=[WORKGROUP]
OS=[Windows 5.0] Server=[Windows 2000
LAN Manager]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational ms-lsa Distributed Computing Environment (DCE)
(1028/udp) services running on the remote host
can be enumerated by connecting on port 135
and doing the appropriate queries.
UUID: bfa951d1-2f0e-11d3-bfd1-
00c04fa3490a, version 1
Endpoint:
ncadg_ip_udp:192.168.1.110[1028]
UUID: 5a7b91f8-ff00-11d0-a9b2-
00c04fb6e6fc, version 1
Endpoint:
ncadg_ip_udp:192.168.1.110[1030]
Annotation: Messenger Service
Named pipe : ntsvcs
Win32 service or process : messenger
Description : Messenger service
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90011
[ return to top ]
Analysis of Host
Address of
Port/Service Issue regarding Port
Host
Security warning(s)
192.168.1.111 epmap (135/tcp)
found
Security note(s)
192.168.1.111 netbios-ssn (139/tcp)
found
microsoft-ds Security note(s)
192.168.1.111
(445/tcp) found
Security note(s)
192.168.1.111 blackjack (1025/tcp)
found
Security note(s)
192.168.1.111 general/tcp
found
192.168.1.111 ssh (22/tcp) No Information
Security warning(s)
192.168.1.111 netbios-ns (137/udp)
found
Security note(s)
192.168.1.111 general/SMB
found
Security note(s)
192.168.1.111 general/SMBClient
found
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10394
Informational blackjack Distributed Computing Environment (DCE)
(1025/tcp) services running on the remote host
can be enumerated by connecting on port 135
and doing the appropriate queries.
UUID: 12345778-1234-abcd-ef00-
0123456789ac, version 1
Endpoint: ncacn_ip_tcp:192.168.1.111[1025]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : SAM access
UUID: 12345678-1234-abcd-ef00-
0123456789ab, version 1
Endpoint: ncacn_ip_tcp:192.168.1.111[1025]
Annotation: IPSec Policy agent endpoint
Named pipe : spoolss
Win32 service or process : spoolsv.exe
Description : Spooler service
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/tcp
Synopsis :
Description :
See also :
http://www.ietf.org/rfc/rfc1323.txt
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.80091
Informational general/tcp Information about this scan :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506
Warning netbios-ns The following 6 NetBIOS names have been
(137/udp) gathered :
WIN2K3 = This is the computer name
registered for workstation services by a
WINS client.
WORKGROUP = Workgroup / Domain name
WIN2K3 = Computer name
WORKGROUP = Workgroup / Domain name
(part of the Browser elections)
WORKGROUP
__MSBROWSE__
The remote host has the following MAC
address on its adapter :
00:0c:29:e2:36:75
CVE : CVE-2008-0087
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90020
Informational general/SM WINDOWS\system32\Dnsapi.dll not
B found/no access ->
Domain=[WORKGROUP] OS=[Windows
Server 2003 3790 Service Pack 1]
Server=[Windows Server 2003 5.2]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2008-0087
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90020
Informational general/SM .NET V2xx not found/no access ->
B Domain=[WORKGROUP] OS=[Windows
Server 2003 3790 Service Pack 1]
Server=[Windows Server 2003 5.2]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-0043
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90010
Informational general/SM .NET V2xx not found/no access ->
B
CVE : CVE-2007-0043
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90010
Informational general/SM WINDOWS\system32\drivers\mrxdav.sys not
B found/no access ->
Domain=[WORKGROUP] OS=[Windows
Server 2003 3790 Service Pack 1]
Server=[Windows Server 2003 5.2]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2008-0080
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90015
Informational general/SM WINDOWS\system32\drivers\mrxdav.sys not
B found/no access ->
CVE : CVE-2008-0080
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90015
Informational general/SM WINDOWS\system32\Msjint40.dll not
B found/no access ->
Domain=[WORKGROUP] OS=[Windows
Server 2003 3790 Service Pack 1]
Server=[Windows Server 2003 5.2]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINDOWS\system32\Msjet40.dll not
B found/no access ->
Domain=[WORKGROUP] OS=[Windows
Server 2003 3790 Service Pack 1]
Server=[Windows Server 2003 5.2]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINDOWS\system32\Msjet40.dll not
B found/no access ->
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINDOWS\system32\Msjint40.dll not
B found/no access ->
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINDOWS\system32\Msjet40.dll not
B found/no access ->
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM WINDOWS\system32\Msjet40.dll not
B found/no access ->
Domain=[WORKGROUP] OS=[Windows
Server 2003 3790 Service Pack 1]
Server=[Windows Server 2003 5.2]
tree connect failed:
NT_STATUS_ACCESS_DENIED
CVE : CVE-2007-6026
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90024
Informational general/SM OS Version = WINDOWS SERVER 2003
BClient 3790 SERVICE PACK 1
Domain = WORKGROUP
SMB Serverversion = WINDOWS SERVER
2003 5.2
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90011
[ return to top ]
Analysis of Host
Address of
Port/Service Issue regarding Port
Host
192.168.1.112 daytime (13/tcp) No Information
Security note(s)
192.168.1.112 time (37/tcp)
found
Security note(s)
192.168.1.112 http (80/tcp)
found
Security note(s)
192.168.1.112 ident (113/tcp)
found
Security note(s)
192.168.1.112 mysql (3306/tcp)
found
Security note(s)
192.168.1.112 general/tcp
found
192.168.1.112 ssh (22/tcp) No Information
192.168.1.112 general/SMBClient No Information
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10107
Informational ident An identd server is running on this port
(113/tcp) OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330
Informational ident
(113/tcp) Overview:
See also:
http://www.mysql.com
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/t Nikto could not be found in your system path.
cp OpenVAS was unable to execute Nikto and to
perform the scan you
requested.
Please make sure that Nikto is installed and that
nikto.pl or nikto is
available in the PATH variable defined for your
environment.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.14260
Informational general/t Information about this scan :
cp
OpenVAS version : 2.0.1
Plugin feed version : 200906251300
Type of plugin feed : OpenVAS NVT Feed
Scanner IP : 192.168.1.106
Port scanner(s) : openvas_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 20
Max checks : 4
Scan duration : unknown (ping_host.nasl not
launched?)
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506
[ return to top ]
Analysis of Host
Address of
Port/Service Issue regarding Port
Host
Security hole(s)
192.168.1.113 http (80/tcp)
found
Security note(s)
192.168.1.113 https (443/tcp)
found
ntp-gps-data Security note(s)
192.168.1.113
(12321/tcp) found
Security warning(s)
192.168.1.113 ssh (22/tcp)
found
Security note(s)
192.168.1.113 ntp (123/udp)
found
Security note(s)
192.168.1.113 general/tcp
found
192.168.1.113 general/SMBClient No Information
Vulnerability Insight:
The flaws are caused by,
- an unspecified stack overflow error in
FastCGI SAPI (fastcgi.c).
- an error during path translation in
cgi_main.c.
- an error with an unknown impact/attack
vectors.
- an unspecified error within the processing of
incomplete multibyte
characters in escapeshellcmd() API function.
- error in curl/interface.c in the cURL
library(libcurl), which could be
exploited by attackers to bypass safe_mode
security restrictions.
- an error in PCRE. i.e buffer overflow error
when handling a character class
containing a very large number of characters
with codepoints greater than
255(UTF-8 mode).
Impact:
Successful exploitation could result in remote
arbitrary code execution,
security restrictions bypass, access to
restricted files, denial of service.
Impact Level: System
Affected Software/OS:
PHP version prior to 5.2.6
Fix:
Upgrade to PHP version 5.2.6 or above,
http://www.php.net/downloads.php
References:
http://pcre.org/changelog.txt
http://www.php.net/ChangeLog-5.php
http://wiki.rpath.com/wiki/Advisories:rPSA-
2008-0176
http://wiki.rpath.com/wiki/Advisories:rPSA-
2008-0178
http://wiki.rpath.com/wiki/Advisories:rPSA-
2008-0086
CVSS Score:
CVSS Base Score : 9.0
(AV:N/AC:L/Au:NR/C:P/I:P/A:C)
CVSS Temporal Score : 7.0
Risk factor : High
CVE : CVE-2008-2050, CVE-2008-2051,
CVE-2007-4850, CVE-2008-0599, CVE-
2008-0674
BID : 29009, 27413, 27786
Other references : CB-A:08-0118
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800110
Vulnerability http (80/tcp)
Vulnerability Insight:
The flaw is caused due to error in
mbfilter_htmlent.c file in the mbstring
extension. These can be exploited via
mb_convert_encoding, mb_check_encoding,
mb_convert_variables, and mb_parse_str
functions.
Impact:
Successful exploitation could allow attackers
to execute arbitrary code via
a crafted string containing an HTML entity.
Affected Software/OS:
PHP version 4.3.0 to 5.2.6 on all running
platform.
References:
http://bugs.php.net/bug.php?id=45722
http://archives.neohapsis.com/archives/fulldis
closure/2008-12/0477.html
CVSS Score:
CVSS Base Score : 10.0
(AV:N/AC:L/Au:NR/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
Risk factor: High
CVE : CVE-2008-5557
BID : 32948
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900185
Vulnerability http (80/tcp)
Overview:
The host is running PHP and is prone to
denial of service vulnerability.
Vulnerability Insight:
This bug is due to an error in
'mbstring.func_overload' setting in .htaccess
file. It can be exploited via modifying
behavior of other sites hosted on
the same web server which causes this setting
to be applied to other virtual
hosts on the same server.
Impact:
Successful exploitation will let the local
attackers to crash an affected web
server.
Affected Software/OS:
PHP version 4.4.4 and prior
PHP 5.1.x to 5.1.6
PHP 5.2.x to 5.2.5
CVSS Score:
CVSS Base Score : 2.1
(AV:L/AC:L/Au:NR/C:N/I:P/A:N)
CVSS Temporal Score : 1.9
Risk factor : Low
CVE : CVE-2009-0754
BID : 33542
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800373
Vulnerability http (80/tcp)
Vulnerability Insight:
The flaw is caused due to,
- An error in initialization of 'page_uid' and
'page_gid' global variables
for use by the SAPI 'php_getuid' function,
which bypass the safe_mode
restrictions.
- When 'safe_mode' is enabled through a
'php_admin_flag' setting in
'httpd.conf' file, which does not enforce the
'error_log', 'safe_mode
restrictions.
- In 'ZipArchive::extractTo' function which
allows attacker to write files
via a ZIP file.
Impact:
Successful exploitation could allow remote
attackers to write arbitrary file,
bypass security restrictions and cause
directory traversal attacks.
Affected Software/OS:
PHP versions prior to 5.2.7.
References:
http://www.php.net/ChangeLog-5.php#5.2.7
http://www.php.net/archive/2008.php#id2008
-12-07-1
http://www.securityfocus.com/archive/1/archi
ve/1/498985/100/0/threaded
CVSS Score:
CVSS Base Score : 7.5
(AV:N/AC:L/Au:NR/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
Risk factor: High
CVE : CVE-2008-5624, CVE-2008-5625,
CVE-2008-5658
BID : 32383, 32625, 32688
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900184
Vulnerability http (80/tcp)
Overview : This host is running WordPress,
which is prone to multiple
vulnerabilities.
Vulnerability Insight :
Affected Software/OS :
WordPress 2.6.1 and prior versions.
References :
http://www.sektioneins.de/advisories/SE-
2008-05.txt
http://seclists.org/fulldisclosure/2008/Sep/019
4.html
http://www.juniper.net/security/auto/vulnerabi
lities/vuln31068.html
http://www.juniper.net/security/auto/vulnerabi
lities/vuln30750.html
CVSS Score :
CVSS Base Score : 6.8
(AV:N/AC:M/Au:NR/C:P/I:P/A:P)
CVSS Temporal Score : 5.3
Risk factor : High
CVE : CVE-2008-3747
BID : 30750, 31068, 31115
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900219
Warning http (80/tcp)
Vulnerability Insight:
Improper handling of .zip file while doing
extraction via
php_zip_make_relative_path function in
php_zip.c file.
Impact:
Successful exploitation could result in denial
of service condition.
Affected Software/OS:
PHP version prior to 5.2.9
Fix:
Upgrade to PHP version 5.2.9 or above,
http://www.php.net/downloads.php
Workaround:
For workaround refer below link,
http://cvs.php.net/viewvc.cgi/php-
src/ext/json/JSON_parser.c?
r1=1.1.2.14&r2=1.1.2.15
References:
http://www.php.net/releases/5_2_9.php
http://www.openwall.com/lists/oss-
security/2009/04/01/9
CVSS Score:
CVSS Base Score : 5.0
(AV:N/AC:L/Au:NR/C:N/I:N/A:P)
CVSS Temporal Score : 3.7
Risk factor : Medium
CVE : CVE-2009-1272
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800393
Warning http (80/tcp)
Vulnerability Insight:
The flaw is caused due to improper handling
of certain inputs when
display_errors settings is enabled.
Impact:
Successful exploitation could allow attackers
to inject arbitrary web script
or HTML via unspecified vectors and conduct
Cross-Site Scripting attacks.
Affected Software/OS:
PHP, PHP version 5.2.7 and prior on all
running platform.
References:
http://jvn.jp/en/jp/JVN50327700/index.html
http://jvndb.jvn.jp/en/contents/2008/JVNDB-
2008-000084.html
CVSS Score:
CVSS Base Score : 2.6
(AV:N/AC:H/Au:NR/C:N/I:P/A:N)
CVSS Temporal Score : 1.9
Risk factor : Low
CVE : CVE-2008-5814
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800334
Warning http (80/tcp)
Overview : The host is running Apache,
which is prone to cross-site scripting
vulnerability.
Vulnerability Insight :
Affected Software/OS :
Apache 2.0.0 to 2.0.63 and Apache 2.2.0 to
2.2.9 on All Platform
***
Note: The script might report a False Positive
as it is only checking for
the vulnerable version of Apache.
Vulnerability is only when mod_proxy
and mod_proxy_ftp is configured with the
installed Apache version.
***
References :
http://httpd.apache.org/
http://www.securityfocus.com/archive/1/4951
80
http://httpd.apache.org/docs/2.0/mod/mod_pr
oxy_ftp.html
CVSS Score :
CVSS Base Score : 5.8
(AV:N/AC:M/Au:NR/C:P/I:P/A:N)
CVSS Temporal Score : 4.5
Risk factor : Medium
CVE : CVE-2008-2939
BID : 30560
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900107
Warning http (80/tcp)
Overview:
PHP is prone to multiple security
vulnerabilities. Successful
exploits could allow an attacker to cause a
denial-of-service
condition. An unspecified issue with an
unknown impact was also
reported.
See also:
http://www.securityfocus.com/bid/33927
Solution:
Updates are available. Please see
http://httpd.apache.org/
for more Information.
See also:
http://www.securityfocus.com/bid/35115
Vulnerability Insight:
The flaw is caused due to incorrect usage of
_REQUEST super global array,
which leads to cross site request forgery
(CSRF) attacks via crafted cookies.
Impact: Successful attack could lead to
execution of arbitrary script code
and can cause denial of service condition.
Affected Software/OS:
WordPress 2.6.3 and earlier on all running
platforms.
References:
http://openwall.com/lists/oss-
security/2008/11/14/1
http://bugs.debian.org/cgi-bin/bugreport.cgi?
bug=504771
CVSS Score:
CVSS Base Score : 4.0
(AV:N/AC:H/Au:NR/C:N/I:P/A:P)
CVSS Temporal Score : 3.6
Risk factor: Medium
CVE : CVE-2008-5113
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800140
Warning http (80/tcp)
Vulnerability Insight:
This flaw is caused due to an error in
'mod_proxy_ajp' when handling
improperly malformed POST requests.
Impact:
Successful exploitation will let the attacker
craft a special HTTP POST
request and gain sensitive information about
the web server.
Workaround:
Update mod_proxy_ajp.c through SVN
Repository (Revision 767089)
http://www.apache.org/dist/httpd/patches/appl
y_to_2.2.11/PR46949.diff
References:
http://secunia.com/advisories/34827
http://xforce.iss.net/xforce/xfdb/50059
http://svn.apache.org/viewvc/httpd/httpd/trun
k/CHANGES?r1=766938&r2=767089
CVSS Score:
CVSS Base Score : 5.0
(AV:N/AC:L/Au:NR/C:P/I:N/A:N)
CVSS Temporal Score : 4.0
Risk factor: Medium
CVE : CVE-2009-1191
BID : 34663
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900499
Warning http (80/tcp)
Vulnerability Insight:
The flaw is caused due to improper validation
of bgd_color or clrBack
argument in imageRotate function.
Impact:
Successful exploitation could let the attacker
read the contents of arbitrary
memory locations through a crafted value for
an indexed image.
Affected Software/OS:
PHP version 5.x to 5.2.8 on all running
platform.
References:
http://securitytracker.com/alerts/2008/Dec/10
21494.html
http://downloads.securityfocus.com/vulnerabi
lities/exploits/33002.php
http://downloads.securityfocus.com/vulnerabi
lities/exploits/33002-2.php
CVSS Score:
CVSS Base Score : 5.0
(AV:N/AC:L/Au:NR/C:P/I:N/A:N)
CVSS Temporal Score : 2.9
Risk factor: Low
CVE : CVE-2008-5498
BID : 33002
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900186
Informational http (80/tcp) A web server is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330
Informational http (80/tcp) The remote web server type is :
Description :
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Plugin output :
Solution :
Add the following lines for each virtual host
in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD}
^(TRACE|TRACK)
RewriteRule .* - [F]
CVE : CVE-2004-2320
BID : 9506, 9561, 11604
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11213
Informational http (80/tcp) The following directories were discovered:
/icons
Description :
Solution :
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.15588
Informational ntp-gps-data A web server is running on this port
(12321/tcp) OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330
Informational ntp-gps-data
(12321/tcp) Synopsis :
Description :
Solution :
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.15588
Informational ntp-gps-data
(12321/tcp) Synopsis :
Description :
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10386
Informational ntp-gps-data The remote web server type is :
(12321/tcp)
MiniServ/0.01
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10107
Warning ssh (22/tcp)
Vulnerability Insight:
The flaw is caused due to the improper
handling of errors within an SSH session
encrypted with a block cipher algorithm in the
Cipher-Block Chaining 'CBC' mode.
Impact:
Successful exploits will allow attackers to
obtain four bytes of plaintext from
an encrypted session.
Affected Software/OS:
Versions prior to OpenSSH 5.2 are
vulnerable. Various versions of SSH Tectia
are also affected.
References:
http://www.securityfocus.com/bid/32319
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10267
Informational ssh (22/tcp) No key given for SLAD checks. SLAD
checks will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90003
Informational ntp
(123/udp) A NTP (Network Time Protocol) server is
listening on this port.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/tcp Nikto could not be found in your system path.
OpenVAS was unable to execute Nikto and to
perform the scan you
requested.
Please make sure that Nikto is installed and
that nikto.pl or nikto is
available in the PATH variable defined for
your environment.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.14260
Informational general/tcp
Synopsis :
Description :
See also :
http://www.ietf.org/rfc/rfc1323.txt
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.80091
Informational general/tcp Information about this scan :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506
[ return to top ]
Analysis of Host
Address of
Port/Service Issue regarding Port
Host
Security note(s)
192.168.1.114 sunrpc (111/tcp)
found
Security warning(s)
192.168.1.114 submission (587/tcp)
found
Security note(s)
192.168.1.114 ssh (22/tcp)
found
Security warning(s)
192.168.1.114 smtp (25/tcp)
found
192.168.1.114 general/SMBClient No Information
Security note(s)
192.168.1.114 sunrpc (111/udp)
found
Security note(s)
192.168.1.114 general/tcp
found
Security note(s)
192.168.1.114 router (520/udp)
found
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111
Warning submission
(587/tcp)
Overview:
The Mailserver on this host answers to VRFY
and/or EXPN requests.
VRFY and EXPN ask the server for
information about an address. They are
inherently unusable through firewalls,
gateways, mail exchangers for part-time
hosts, etc. OpenVAS suggests that, if you
really want to publish this type of
information, you use a mechanism that
legitimate users actually know about,
such as Finger or HTTP.
Solution:
Disable VRFY and EXPN on your Mailserver.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10263
Informational ssh (22/tcp) An ssh server is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330
Informational ssh (22/tcp) No key given for SLAD checks. SLAD checks
will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90002
Informational ssh (22/tcp) Remote SSH version : SSH-2.0-Sun_SSH_1.2
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10267
Informational ssh (22/tcp) No key given for SLAD checks. SLAD checks
will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90003
Warning smtp
(25/tcp)
Overview:
The Mailserver on this host answers to VRFY
and/or EXPN requests.
VRFY and EXPN ask the server for
information about an address. They are
inherently unusable through firewalls,
gateways, mail exchangers for part-time
hosts, etc. OpenVAS suggests that, if you
really want to publish this type of
information, you use a mechanism that
legitimate users actually know about,
such as Finger or HTTP.
Solution:
Disable VRFY and EXPN on your Mailserver.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10263
Informational sunrpc RPC program #100000 version 4 'portmapper'
(111/udp) (portmap sunrpc rpcbind) is running on this
port
RPC program #100000 version 3 'portmapper'
(portmap sunrpc rpcbind) is running on this
port
RPC program #100000 version 2 'portmapper'
(portmap sunrpc rpcbind) is running on this
port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111
Informational general/tcp ICMP based OS fingerprint results:
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/tcp Information about this scan :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506
Informational router A RIP-2 agent is running on this port.
(520/udp)
Risk factor: None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11822
[ return to top ]
Analysis of Host
Address of
Port/Service Issue regarding Port
Host
Security warning(s)
192.168.1.115 ssh (22/tcp)
found
Security hole(s)
192.168.1.115 http (80/tcp)
found
Security note(s)
192.168.1.115 https (443/tcp)
found
ntp-gps-data Security note(s)
192.168.1.115
(12321/tcp) found
192.168.1.115 ntp (123/udp) Security note(s)
found
192.168.1.115 general/SMBClient No Information
Security hole(s)
192.168.1.115 general/tcp
found
Vulnerability Insight:
The flaw is caused due to the improper
handling of errors within an SSH session
encrypted with a block cipher algorithm in the
Cipher-Block Chaining 'CBC' mode.
Impact:
Successful exploits will allow attackers to
obtain four bytes of plaintext from
an encrypted session.
Affected Software/OS:
Versions prior to OpenSSH 5.2 are
vulnerable. Various versions of SSH Tectia
are also affected.
References:
http://www.securityfocus.com/bid/32319
Vulnerability Insight:
The flaws are caused by,
- an unspecified stack overflow error in
FastCGI SAPI (fastcgi.c).
- an error during path translation in
cgi_main.c.
- an error with an unknown impact/attack
vectors.
- an unspecified error within the processing of
incomplete multibyte
characters in escapeshellcmd() API function.
- error in curl/interface.c in the cURL
library(libcurl), which could be
exploited by attackers to bypass safe_mode
security restrictions.
- an error in PCRE. i.e buffer overflow error
when handling a character class
containing a very large number of characters
with codepoints greater than
255(UTF-8 mode).
Impact:
Successful exploitation could result in remote
arbitrary code execution,
security restrictions bypass, access to
restricted files, denial of service.
Affected Software/OS:
PHP version prior to 5.2.6
Fix:
Upgrade to PHP version 5.2.6 or above,
http://www.php.net/downloads.php
References:
http://pcre.org/changelog.txt
http://www.php.net/ChangeLog-5.php
http://wiki.rpath.com/wiki/Advisories:rPSA-
2008-0176
http://wiki.rpath.com/wiki/Advisories:rPSA-
2008-0178
http://wiki.rpath.com/wiki/Advisories:rPSA-
2008-0086
CVSS Score:
CVSS Base Score : 9.0
(AV:N/AC:L/Au:NR/C:P/I:P/A:C)
CVSS Temporal Score : 7.0
Risk factor : High
CVE : CVE-2008-2050, CVE-2008-2051,
CVE-2007-4850, CVE-2008-0599, CVE-
2008-0674
BID : 29009, 27413, 27786
Other references : CB-A:08-0118
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800110
Vulnerability http (80/tcp)
Vulnerability Insight:
The flaw is caused due to error in
mbfilter_htmlent.c file in the mbstring
extension. These can be exploited via
mb_convert_encoding, mb_check_encoding,
mb_convert_variables, and mb_parse_str
functions.
Impact:
Successful exploitation could allow attackers
to execute arbitrary code via
a crafted string containing an HTML entity.
Affected Software/OS:
PHP version 4.3.0 to 5.2.6 on all running
platform.
References:
http://bugs.php.net/bug.php?id=45722
http://archives.neohapsis.com/archives/fulldis
closure/2008-12/0477.html
CVSS Score:
CVSS Base Score : 10.0
(AV:N/AC:L/Au:NR/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
Risk factor: High
CVE : CVE-2008-5557
BID : 32948
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900185
Vulnerability http (80/tcp)
Overview:
The host is running PHP and is prone to
denial of service vulnerability.
Vulnerability Insight:
This bug is due to an error in
'mbstring.func_overload' setting in .htaccess
file. It can be exploited via modifying
behavior of other sites hosted on
the same web server which causes this setting
to be applied to other virtual
hosts on the same server.
Impact:
Successful exploitation will let the local
attackers to crash an affected web
server.
Affected Software/OS:
PHP version 4.4.4 and prior
PHP 5.1.x to 5.1.6
PHP 5.2.x to 5.2.5
References:
http://bugs.php.net/bug.php?id=27421
https://bugzilla.redhat.com/show_bug.cgi?
id=479272
CVSS Score:
CVSS Base Score : 2.1
(AV:L/AC:L/Au:NR/C:N/I:P/A:N)
CVSS Temporal Score : 1.9
Risk factor : Low
CVE : CVE-2009-0754
BID : 33542
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800373
Vulnerability http (80/tcp)
Vulnerability Insight:
The flaw is caused due to,
- An error in initialization of 'page_uid' and
'page_gid' global variables
for use by the SAPI 'php_getuid' function,
which bypass the safe_mode
restrictions.
- When 'safe_mode' is enabled through a
'php_admin_flag' setting in
'httpd.conf' file, which does not enforce the
'error_log', 'safe_mode
restrictions.
- In 'ZipArchive::extractTo' function which
allows attacker to write files
via a ZIP file.
Impact:
Successful exploitation could allow remote
attackers to write arbitrary file,
bypass security restrictions and cause
directory traversal attacks.
Affected Software/OS:
PHP versions prior to 5.2.7.
References:
http://www.php.net/ChangeLog-5.php#5.2.7
http://www.php.net/archive/2008.php#id2008
-12-07-1
http://www.securityfocus.com/archive/1/archi
ve/1/498985/100/0/threaded
CVSS Score:
CVSS Base Score : 7.5
(AV:N/AC:L/Au:NR/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
Risk factor: High
CVE : CVE-2008-5624, CVE-2008-5625,
CVE-2008-5658
BID : 32383, 32625, 32688
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900184
Warning http (80/tcp)
Vulnerability Insight:
Improper handling of .zip file while doing
extraction via
php_zip_make_relative_path function in
php_zip.c file.
Impact:
Successful exploitation could result in denial
of service condition.
Affected Software/OS:
PHP version prior to 5.2.9
Fix:
Upgrade to PHP version 5.2.9 or above,
http://www.php.net/downloads.php
Workaround:
For workaround refer below link,
http://cvs.php.net/viewvc.cgi/php-
src/ext/json/JSON_parser.c?
r1=1.1.2.14&r2=1.1.2.15
References:
http://www.php.net/releases/5_2_9.php
http://www.openwall.com/lists/oss-
security/2009/04/01/9
CVSS Score:
CVSS Base Score : 5.0
(AV:N/AC:L/Au:NR/C:N/I:N/A:P)
CVSS Temporal Score : 3.7
Risk factor : Medium
CVE : CVE-2009-1272
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800393
Warning http (80/tcp)
Vulnerability Insight:
The flaw is caused due to improper handling
of certain inputs when
display_errors settings is enabled.
Impact:
Successful exploitation could allow attackers
to inject arbitrary web script
or HTML via unspecified vectors and conduct
Cross-Site Scripting attacks.
Affected Software/OS:
PHP, PHP version 5.2.7 and prior on all
running platform.
References:
http://jvn.jp/en/jp/JVN50327700/index.html
http://jvndb.jvn.jp/en/contents/2008/JVNDB-
2008-000084.html
CVSS Score:
CVSS Base Score : 2.6
(AV:N/AC:H/Au:NR/C:N/I:P/A:N)
CVSS Temporal Score : 1.9
Risk factor : Low
CVE : CVE-2008-5814
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800334
Warning http (80/tcp)
Overview : The host is running Apache,
which is prone to cross-site scripting
vulnerability.
Vulnerability Insight :
Affected Software/OS :
Apache 2.0.0 to 2.0.63 and Apache 2.2.0 to
2.2.9 on All Platform
***
Note: The script might report a False Positive
as it is only checking for
the vulnerable version of Apache.
Vulnerability is only when mod_proxy
and mod_proxy_ftp is configured with the
installed Apache version.
***
References :
http://httpd.apache.org/
http://www.securityfocus.com/archive/1/4951
80
http://httpd.apache.org/docs/2.0/mod/mod_pr
oxy_ftp.html
CVSS Score :
CVSS Base Score : 5.8
(AV:N/AC:M/Au:NR/C:P/I:P/A:N)
CVSS Temporal Score : 4.5
Risk factor : Medium
CVE : CVE-2008-2939
BID : 30560
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900107
Warning http (80/tcp)
Overview:
PHP is prone to multiple security
vulnerabilities. Successful
exploits could allow an attacker to cause a
denial-of-service
condition. An unspecified issue with an
unknown impact was also
reported.
Solution:
The vendor has released PHP 5.2.9 to address
these issues. Please
see http://www.php.net/ fore more
information.
See also:
http://www.securityfocus.com/bid/33927
Solution:
Updates are available. Please see
http://httpd.apache.org/
for more Information.
See also:
http://www.securityfocus.com/bid/35115
Vulnerability Insight:
This flaw is caused due to an error in
'mod_proxy_ajp' when handling
improperly malformed POST requests.
Impact:
Successful exploitation will let the attacker
craft a special HTTP POST
request and gain sensitive information about
the web server.
Affected Software/OS:
Apache HTTP Version 2.2.11
Workaround:
Update mod_proxy_ajp.c through SVN
Repository (Revision 767089)
http://www.apache.org/dist/httpd/patches/appl
y_to_2.2.11/PR46949.diff
References:
http://secunia.com/advisories/34827
http://xforce.iss.net/xforce/xfdb/50059
http://svn.apache.org/viewvc/httpd/httpd/trun
k/CHANGES?r1=766938&r2=767089
CVSS Score:
CVSS Base Score : 5.0
(AV:N/AC:L/Au:NR/C:P/I:N/A:N)
CVSS Temporal Score : 4.0
Risk factor: Medium
CVE : CVE-2009-1191
BID : 34663
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900499
Warning http (80/tcp)
Vulnerability Insight:
The flaw is caused due to improper validation
of bgd_color or clrBack
argument in imageRotate function.
Impact:
Successful exploitation could let the attacker
read the contents of arbitrary
memory locations through a crafted value for
an indexed image.
Affected Software/OS:
PHP version 5.x to 5.2.8 on all running
platform.
References:
http://securitytracker.com/alerts/2008/Dec/10
21494.html
http://downloads.securityfocus.com/vulnerabi
lities/exploits/33002.php
http://downloads.securityfocus.com/vulnerabi
lities/exploits/33002-2.php
CVSS Score:
CVSS Base Score : 5.0
(AV:N/AC:L/Au:NR/C:P/I:N/A:N)
CVSS Temporal Score : 2.9
Risk factor: Low
CVE : CVE-2008-5498
BID : 33002
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.900186
Warning http (80/tcp)
Some Web Servers use a file called
/robot(s).txt to make search engines and
any other indexing tools visit their WebPages
more frequently and
more efficiently.
User-agent: *
Crawl-delay: 10
# Directories
Disallow: /includes/
Disallow: /misc/
Disallow: /modules/
Disallow: /profiles/
Disallow: /scripts/
Disallow: /sites/
Disallow: /themes/
# Files
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /contact/
Disallow: /logout/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
# Paths (no clean URLs)
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=contact/
Disallow: /?q=logout/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/
Overview:
This host is running Drupal, an open source
content management platform.
See also:
http://drupal.org/
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.100169
Informational http (80/tcp)
Synopsis :
Description :
The remote webserver supports the TRACE
and/or TRACK methods. TRACE and
TRACK
are HTTP methods which are used to debug
web server connections.
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Plugin output :
Solution :
Add the following lines for each virtual host
in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD}
^(TRACE|TRACK)
RewriteRule .* - [F]
CVE : CVE-2004-2320
BID : 9506, 9561, 11604
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11213
Informational https
(443/tcp) Synopsis :
Solution :
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.15588
Informational ntp-gps-data A web server is running on this port
(12321/tcp) OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330
Informational ntp-gps-data
(12321/tcp) Synopsis :
Description :
Solution :
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.15588
Informational ntp-gps-data
(12321/tcp) Synopsis :
Description :
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10386
Informational ntp-gps-data The remote web server type is :
(12321/tcp)
MiniServ/0.01
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10107
Informational ntp
(123/udp) A NTP (Network Time Protocol) server is
listening on this port.
Vulnerability Insight:
Flaws are due to,
- ability to view attached file content which
they don't have access.
- deficiency in the user module allows users
who had been blocked
by access rules.
- weakness in the node module API allows for
node validation to
be bypassed in certain circumstances.
Affected Software/OS:
Drupal Version 5.x prior to 5.11 and 6.x prior
to 6.5 on all running platform.
References:
http://drupal.org/node/318706
CVSS Score:
CVSS Base Score : 6.0
(AV:N/AC:M/Au:SI/C:P/I:P/A:P)
CVSS Temporal Score : 4.4
Risk factor: Medium
CVE : CVE-2008-4789, CVE-2008-4790,
CVE-2008-4791, CVE-2008-4793
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.800123
Informational general/tcp ICMP based OS fingerprint results:
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/tcp Nikto could not be found in your system path.
OpenVAS was unable to execute Nikto and to
perform the scan you
requested.
Please make sure that Nikto is installed and
that nikto.pl or nikto is
available in the PATH variable defined for
your environment.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.14260
Informational general/tcp
Synopsis :
Description :
See also :
http://www.ietf.org/rfc/rfc1323.txt
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.80091
Informational general/tcp Information about this scan :
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506