|
發表於 2005-6-4 19:53:02
|
顯示全部樓層
ip : 202.175.162.233
檢測結果
存活主機 1
漏洞數量 1
警告數量 0
提示數量 5
主機列表
主機 檢測結果
202.175.162.233 發現安全漏洞
主機摘要 - OS: Unknown OS; PORT/TCP: 21, 25, 110
[返回頂部]
主機分析: 202.175.162.233
主機地址 端口/服務 服務漏洞
202.175.162.233 pop3 (110/tcp) 發現安全提示
202.175.162.233 ftp (21/tcp) 發現安全漏洞
202.175.162.233 smtp (25/tcp) 發現安全提示
安全漏洞及解決方案: 202.175.162.233
類型 端口/服務 安全漏洞及解決方案
提示 pop3 (110/tcp) Maybe the "pop3" service running on this port.
NESSUS_ID : 10330
漏洞 ftp (21/tcp)
It was possible to disable the remote FTP server
by connecting to it about 3000 times, with
one connection at a time.
If the remote server is running from within [x]inetd, this
is a feature and the FTP server should automatically be back
in a couple of minutes.
An attacker may use this flaw to prevent this
service from working properly.
Solution : If the remote server is GoodTech ftpd server,
download the newest version from http://www.goodtechsys.com.
BID : 2270
Risk factor : Serious
CVE_ID : CAN-2001-0188
BUGTRAQ_ID : 2270
NESSUS_ID : 10690
提示 ftp (21/tcp) Maybe the "ftp" service running on this port.
NESSUS_ID : 10330
提示 ftp (21/tcp) An unknown service runs on this port.
It is sometimes opened by this/these Trojan horse(s):
Back Construction
Blade Runner
Cattivik FTP Server
CC Invader
Dark FTP
Doly Trojan
Fore
FreddyK
Invisible FTP
Jugge
aut 42
Larva
MotIv FTP
Net Administrator
Ramen
RTB 666
Senna Spy FTP server
The Flu
Traitor 21
WebEx
WinCrash
Unless you know for sure what is behind it, you'd better
check your system
*** Anyway, don't panic, Nessus only found an open port. It may
*** have been dynamically allocated to some service (RPC...)
Solution: if a trojan horse is running, run a good antivirus scanner
Risk factor : Low
NESSUS_ID : 11157
提示 smtp (25/tcp) Maybe the "smtp" service running on this port.
NESSUS_ID : 10330
提示 smtp (25/tcp) For some reason, we could not send the 42.zip file to this MTA
BUGTRAQ_ID : 3027
NESSUS_ID : 11036 |
|