IT
Project Report |
|
Please be patient. This page may take a few minutes to load. This is only a sample internal report for Network Administrators.
To assist your Network Administrator toward improving potential internal
exposure, the Project Management Report is sorted into three
vulnerability categories, which are Confirmed
Vulnerabilities, Potential Vulnerabilities,
and Information Gathered.
Within each category, the vulnerabilities discovered are ranked
according to severity from Urgent (5), Critical (4), Serious (3), Medium
(2), and Minimal (1), where "5.0" is the highest and "1.0" the lowest
security risk from unauthorized internal intrusion. Go to
Vulnerability Categories and Severity Levels for more information.
Understanding the
VISTA Reports
Vulnerability
Categories and Severity Levels
General help page |
Report Summary | |||||||||||||||||||
|
|
||||||||||||||||||
|
Summary of Vulnerabilities |
|
|
|
|
|
Detailed Results |
192.xxx.1.3 (Server Name) | Microsoft Windows 2000 SP4 |
|
|
|
|
5
|
Microsoft NNTP Remote Code Execution Vulnerability (MS04-036) |
New
|
5
|
Apache Mod_Proxy Remote Negative Content-Length Buffer Overflow Vulnerability |
port 8080/tcp
|
New
|
A remote buffer overflow vulnerability exists in Apache mod_proxy. The vulnerability occurs in the proxyutil.c source file. The source of the issue is that users can pass a negative value to be used as the length in a memory copy operation. Specifically, the length value is passed to the ap_bread() function, which results in a memcpy() with a negative length argument. This could permit a malicious user to corrupt process memory. This may triggered if a remote user specifies a negative Content-Length: HTTP header field to be passed through the proxy.
It has been conjectured that FreeBSD may permit exploitation since its memcpy() implementation will copy data backwards, potentially allowing for corruption of sensitive variables that affect execution flow of the program. Apache also calls signal handling routines when encountering a SEGV, which may provide an exploitation vector for this vulnerability.
Multiple other vendors have released patched versions of their own distributions of the software. This includes Mandrake, Debian, Gentoo, OpenPKG, OpenBSD, SGI, IBM, and HP. Check the individual distributions' Web sites for download information.
5
|
TCP Connections Established to Firewalled/Filtered Ports via HTTP Proxy |
port 8080/tcp
|
New
|
Note that the service only tried to connect to the firewalled/filtered ports. No attempts were made to detect potential vulnerabilities that may exist on the daemons/services listening on these ports.
Port | Server Banner or Version |
443 |
4
|
Installed PCAnywhere |
New
|
If you did not intentionally install PCAnywhere for remote maintenance reasons, then it should be removed.
If this application was intentionally installed and is currently in use, then we recommend that you follow all vendor suggested guidelines to make it safe. For more information, refer to the Addressing Security with pcAnywhere PDF document.
4
|
Remote Windows User List Disclosure Vulnerability |
New
|
For Windows NT, setting this registry value limits only certain interfaces to this data. It is not possible to completely eliminate this vulnerability through a registry setting.
There is another interesting Microsoft document called Local Policies about Windows security policies settings for local policies.
Windows XP onwards Microsoft has added more granular control to the anonymous user access by adding couple of more DWORD registry values in the same key location as RestrictAnonymous, RestrictAnonymousSAM and EveryoneIncludesAnonymous. Set RestrictAnonymous = 1 to restrict share information access, RestrictAnonymousSAM = 1 to prevent enumeration of SAM accounts (User Accounts) and EveryoneIncludesAnonymous = 0 to prevent null-sessions from having any rights.
If possible, filter out Microsoft networking ports such as TCP ports 135, 137, 138, 139, and UDP ports 135, 137, 138.
Aministratt |
TsInternetUser |
IUSR_1 |
IWAM_1 |
1$ |
4
|
TCP Connections Established to Open Port(s) on the Host via HTTP Proxy |
port 8080/tcp
|
New
|
4
|
Writeable SNMP Information |
port 161/udp
|
New
|
2
|
Anonymous Access to LDAP Server |
port 3268/tcp
|
New
|
Please note that the results below represent only the first 5 entries that could be extracted from the server.
3
|
Microsoft Window's NNTP Denial of Service Vulnerability |
port 119/tcp |
New |
Network News Transfer Protocol (NNTP) is a protocol used to process posting, distributing, searching and archiving news articles posted to Usenet newsgroups. By default, NNTP runs if Windows NT 4.0 Option Pack or Windows 2000 Server are installed. It is not installed by default on Windows NT 4.0 or Windows 2000 Professional.
Due to a flaw in the Microsoft NNTP service, it's possible for a host to be led to consume all available memory resources. This behavior is the result of flaws in the server's memory management.
Malformed news postings submitted repeatedly to an affected host will result in the accumulation of allocated memory that is not freed after use.
You must restart your system in order to regain normal functionality.
Note: Since we don't exploit Denial Of Service vulnerabilities, we can't detect whether or not your machine is patched. If you've already applied the appropriate patch, then you can safely ignore this warning.
5
|
Multiple Vendor SNMP Request and Trap Handling Vulnerabilities |
Active |
SNMP traps are messages sent from agent to manager systems. They typically notify the manager that some event has occured or otherwise provide information about the status of the agent.
Multiple vulnerabilities have been discovered in the request and trap handling in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP request and trap messages.
1
|
LDAP Information Gathering |
N/A |
RFC 2251-Lightweight Directory Access Protocol(v3)
The root DSE (DSA-Specific Entry) data can be retrieved from an LDAPv3 server by performing a base-level search with a null BaseDN and filter ObjectClass=*. The root DSE publishes information about the LDAP server, including which LDAP versions it supports, any supported SASL mechanisms, supported controls, and the DN for its subschemaSubentry. In addition to server information, operational attributes may be exposed that allow for extended administration functionality.
Appendices |
Vulnerability Levels | ||
A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins. Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a complete compromise of the host. | ||
Severity | Level | Description |
1
|
Minimal | Intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities. |
2
|
Medium | Intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions. |
3
|
Serious | Intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail-relaying. |
4
|
Critical | Intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host. |
5
|
Urgent | Intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors. |
Potential Vulnerability Levels | ||
A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to perform an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential vulnerabilities further. | ||
Severity | Level | Description |
1
|
Minimal | If this vulnerability exists on your system, intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities. |
2
|
Medium | If this vulnerability exists on your system, intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions. |
3
|
Serious | If this vulnerability exists on your system, intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail-relaying. |
4
|
Critical | If this vulnerability exists on your system, intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host. |
5
|
Urgent | If this vulnerability exists on your system, intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors. |
Information Gathered | ||
Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open TCP services. | ||
Severity | Level | Description |
1
|
Minimal | Intruders may be able to retrieve sensitive information related to the host, such as open UDP and TCP services lists, and detection of firewalls. |
2
|
Medium | Intruders may be able to determine the operating system running on the host, and view banner versions. |
3
|
Serious | Intruders may be able to detect highly sensitive data, such as global system user lists. |
All rights reserved; Our logo
is registered with the United States Patent and Trademark Office. CONFIDENTIAL AND PROPRIETARY INFORMATION Yennik, Inc. and its testing company (Qualys, Inc.) provide the vulnerability services "As Is" without any warranty of any kind. Yennik, Inc. and its testing company make no warranty that the vulnerability service will detect every vulnerability in your network, or that the suggested solutions and advice provided in this report, together with the results of the scan, will be error-free or complete. The Service does not include wireless specific vulnerabilities. Yennik, Inc. and its testing company shall not be responsible or liable for the accuracy, usefulness, or availability of any information transmitted via the vulnerability service, and shall not be responsible or liable for any use or application of the information contained in this report. The correctness and completeness of your vulnerability reports is very important to us. If you believe our system made an error in your report, please notify us. |