Security Issues and Fixes: 221.130.182.77 |
Type | Port/Service | Security Issues and Fixes |
Informational | HTTP proxy server (8080/tcp) | Services
Maybe the "HTTP proxy server" service running on this port.
NESSUS_ID : 10330
|
Informational | www (80/tcp) | Services
A web server is running on this port
Here is its banner :
HTTP/1.1 400 Bad Request
Content-Type: text/html
Date: Wed, 21 Mar 2007 18:04:04 GMT
Connection: close
Content-Length: 39
<h1>Bad Request (Invalid Hostname)</h1>
NESSUS_ID : 10330
|
Informational | HTTP proxy (3128/tcp) | Services
Maybe the "HTTP proxy" service running on this port.
NESSUS_ID : 10330
|
Informational | MySql (3306/tcp) | Services
Maybe the "MySql" service running on this port.
Here is its banner:
2e .
NESSUS_ID : 10330
|
Informational | MySql (3306/tcp) | MySQL Server version
Remote MySQL version : 4.0.24-nt-log
NESSUS_ID : 10719
|
Informational | nntp (119/tcp) | Services
Maybe the "nntp" service running on this port.
NESSUS_ID : 10330
|
Informational | https (443/tcp) | Services
Maybe the "https" service running on this port.
NESSUS_ID : 10330
|
Informational | Windows Terminal Services (3389/tcp) | Services
Maybe the "Windows Terminal Services" service running on this port.
NESSUS_ID : 10330
|
Informational | Windows Terminal Services (3389/tcp) | Windows Terminal Service Enabled
The Terminal Services are enabled on the remote host.
Terminal Services allow a Windows user to remotely obtain
a graphical login (and therefore act as a local user on the
remote host).
If an attacker gains a valid login and password, he may
be able to use this service to gain further access
on the remote host. An attacker may also use this service
to mount a dictionnary attack against the remote host to try
to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable
to Man-in-the-middle attacks, making it easy for attackers to
steal the credentials of legitimates users by impersonating the
Windows server.
Solution : Disable the Terminal Services if you do not use them, and
do not allow this service to run across the inte
et
Risk factor : Low
BUGTRAQ_ID : 3099, 7258
NESSUS_ID : 10940
|
Informational | IMAP-ssl (993/tcp) | Services
Maybe the "IMAP-ssl" service running on this port.
NESSUS_ID : 10330
|
Informational | POP3-ssl (995/tcp) | Services
Maybe the "POP3-ssl" service running on this port.
NESSUS_ID : 10330
|
Informational | SOCKS (1080/tcp) | Services
Maybe the "SOCKS" service running on this port.
NESSUS_ID : 10330
|
Informational | unknown (8000/tcp) | Services
An unknown service is running on this port.
NESSUS_ID : 10330
|
Informational | NNTP-ssl (563/tcp) | Services
Maybe the "NNTP-ssl" service running on this port.
NESSUS_ID : 10330
|
Informational | SMTP-ssl (465/tcp) | Services
Maybe the "SMTP-ssl" service running on this port.
NESSUS_ID : 10330
|
Informational | imap (143/tcp) | Services
An IMAP server is running on this port
NESSUS_ID : 10330
|
Informational | imap (143/tcp) | IMAP Banner
The remote imap server banner is :
* OK IMAP4 Server (IMail 8.01) GET BAD / Unknown Command
Versions and types should be omitted where possible.
Change the imap banner to something generic.
NESSUS_ID : 11414
|
Wa
ing | smtp (25/tcp) | EXPN and VRFY commands
The remote SMTP server answers to the EXPN and/or VRFY commands.
The EXPN command can be used to find the delivery address of mail aliases, or
even the full name of the recipients, and the VRFY command may be used to check the validity of an account.
Your mailer should not allow remote users to use any of these commands,
because it gives them too much information.
Solution : if you are using Sendmail, add the option :
O PrivacyOptions=goaway
in /etc/sendmail.cf.
Risk factor : Low
CVE_ID : CAN-1999-0531
NESSUS_ID : 10249
|
Informational | smtp (25/tcp) | Services
An SMTP server is running on this port
Here is its banner :
220 computer (IMail 8.01 2953-1) NT-ESMTP Server X1 502 unimplemented command
NESSUS_ID : 10330
|
Informational | smtp (25/tcp) | SMTP Server type and version
Remote SMTP server banner :
220 computer (IMail 8.01 2957-1) NT-ESMTP Server X1
NESSUS_ID : 10263
|
Informational | ftp (21/tcp) | Services
An FTP server is running on this port.
Here is its banner :
220 Serv-U FTP Server v6.3 for WinSock ready...
NESSUS_ID : 10330
|
Informational | ftp (21/tcp) | FTP Server type and version
Remote FTP server banner :
220 Serv-U FTP Server v6.3 for WinSock ready...
NESSUS_ID : 10092
|
Informational | pop3 (110/tcp) | Services
A pop3 server is running on this port
NESSUS_ID : 10330
|
Informational | pop3 (110/tcp) | POP3 Server type and version
The remote POP3 servers leak information about the software it is running,
through the login banner. This may assist an attacker in choosing an attack
strategy.
Versions and types should be omitted where possible.
The version of the remote POP3 server is :
+OK X1 NT- Server computer (IMail 8.01 113-1) -ERR illegal command
Solution : Change the login banner to something generic.
Risk factor : Low
NESSUS_ID : 10185
|
Informational | ms-sql-s (1433/tcp) | Services
Maybe the "ms-sql-s" service running on this port.
NESSUS_ID : 10330
|
Informational | ms-sql-s (1433/tcp) | Microsoft SQL TCP/IP listener is running
Microsoft SQL server is running on this port.
You should never let any unauthorized users establish
connections to this service.
Solution: Block this port from outside communication
Risk factor : Medium
CVE_ID : CAN-1999-0652
NESSUS_ID : 10144
|
Informational | network blackjack (1025/tcp) | Services
Maybe the "network blackjack" service running on this port.
NESSUS_ID : 10330
|
Wa
ing | msrdp (3389/tcp) | Microsoft Windows Remote Desktop Protocol Server Private Key Disclosure Vulnerability
The remote version of Remote Desktop Protocol Server (Terminal Service) is
vulnerable to a man in the middle attack.
An attacker may exploit this flaw to decrypt communications between client
and server and obtain sensitive information (passwords, ...).
See Also : http://www.oxid.it/downloads/rdp-gbu.pdf
Solution : None at this time.
Risk factor : Medium
CVE_ID : CAN-2005-1794
BUGTRAQ_ID : 13818
NESSUS_ID : 18405
|
Informational | mssql (1433/tcp) | Microsoft SQL TCP/IP listener is running
Microsoft SQL server is running on this port.
You should never let any unauthorized users establish
connections to this service.
Solution: Block this port from outside communication
Risk factor : Medium
CVE_ID : CAN-1999-0652
NESSUS_ID : 10144 |