Summary

This document reports on the results of an automatic security scan. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue.

Vendor security updates are not trusted.

Overrides are on. When a result has an override, this report uses the threat of the override.

Notes are included in the report.

This report might not show details of all issues that were found. It only lists hosts that produced issues. Issues with the threat level "Debug" are not shown.

This report contains all 19 results selected by the filtering described above. Before filtering there were 19 results.

Scan started: Tue Oct 15 11:06:27 2013
Scan ended: Tue Oct 15 11:17:05 2013

Host Summary

Host Start End High Medium Low Log False Positive
127.0.0.1 (localhost.localdomain) Oct 15, 11:06:49 (not finished) 1 0 2 16 0
Total: 1 1 0 2 16 0

Results per Host

Host 127.0.0.1

Scanning of this host started at: 2013-10-15T11:06:49Z
Number of results: 19

Port Summary for Host 127.0.0.1

Service (Port) Threat Level
smtp (25/tcp) High
general/tcp Low
general/CPE-T Log
general/HOST-T Log
otp (9390/tcp) Log
ssh (22/tcp) Log
sunrpc (111/tcp) Log
unknown (875/tcp) Log

Security Issues for Host 127.0.0.1

smtp (25/tcp)
High (CVSS: 7.5)
NVT: SendMail Mail Relay Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.802194)
  Summary:
  This host is installed with SendMail and is prone to mail relay
  vulnerability.
  Vulnerability Insight:
  The flaw is due to an error in the mailconf module in Linuxconf which
  generates the Sendmail configuration file (sendmail.cf) and configures
  Sendmail to run as an open mail relay, which allows remote attackers to send
  Spam email.
  Impact:
  Successful exploitation will allow attackers to send email messages outside
  of the served network. This could result in unauthorized messages being sent
  from the vulnerable server.
  Impact Level: Application/System
  Affected Software/OS:
  Linuxconf versions 1.24 r2, 1.2.5 r3
  Linuxconf versions 1.24 r2, 1.2.5 r3 on Conectiva Linux 6.0 through 8
  IBM AIX versions 4.3, 4.3.1, 4.3.2, 4.3.3, 5.1, 5.1 L, 5.2
  Solution:
  Upgrade to the latest version of Linuxconf version 1.29r1 or later
  For updates refer to http://www.solucorp.qc.ca/linuxconf/
  For IBM AIX, apply the patch from below link
  ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z
References
CVE: CVE-2002-1278, CVE-2003-0285
BID: 6118, 7580
Other:
URL:http://osvdb.org/6066
URL:http://xforce.iss.net/xforce/xfdb/10554
URL:http://www.securityfocus.com/bid/6118/solution
general/tcp
Low (CVSS: 0.0)
NVT: Sendmail Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800608)
Sendmail version 8.14.7 was detected on the host
smtp (25/tcp)
Low (CVSS: 0.0)
NVT: SMTP Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10263)
Remote SMTP server banner :
220 localhost.localdomain ESMTP Sendmail 8.14.7/8.14.7; Tue, 15 Oct 2013 07:07:02 -0400 
This is probably: Sendmail
general/CPE-T
Log (CVSS: 0.0)
NVT: CPE Inventory (OID: 1.3.6.1.4.1.25623.1.0.810002)
127.0.0.1|cpe:/a:sendmail:sendmail:8.14.7
127.0.0.1|cpe:/a:openbsd:openssh:6.2
127.0.0.1|cpe:/o:linux:kernel
general/HOST-T
Log (CVSS: 0.0)
NVT: Host Summary (OID: 1.3.6.1.4.1.25623.1.0.810003)
traceroute:127.0.0.1
TCP ports:111,22,9390,25
UDP ports:
general/tcp
Log (CVSS: 0.0)
NVT: OS fingerprinting (OID: 1.3.6.1.4.1.25623.1.0.102002)
ICMP based OS fingerprint results: (92% confidence)
Linux Kernel
References
Other:
URL:http://www.phrack.org/issues.html?issue=57&id=7#article
general/tcp
Log (CVSS: 0.0)
NVT: Checks for open udp ports (OID: 1.3.6.1.4.1.25623.1.0.103978)
Open UDP ports: [None found]
general/tcp
Log (CVSS: 0.0)
NVT: Traceroute (OID: 1.3.6.1.4.1.25623.1.0.51662)
Here is the route from 127.0.0.1 to 127.0.0.1:
127.0.0.1
general/tcp
Log (CVSS: 0.0)
NVT: Checks for open tcp ports (OID: 1.3.6.1.4.1.25623.1.0.900239)
Open TCP ports: 111, 22, 9390, 25
otp (9390/tcp)
Log
NVT: (OID: 0)
Open port.
smtp (25/tcp)
Log
NVT: (OID: 0)
Open port.
smtp (25/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An SMTP server is running on this port
Here is its banner : 
220 localhost.localdomain ESMTP Sendmail 8.14.7/8.14.7; Tue, 15 Oct 2013 07:06:58 -0400 
ssh (22/tcp)
Log
NVT: (OID: 0)
Open port.
ssh (22/tcp)
Log (CVSS: 0.0)
NVT: SSH Protocol Versions Supported (OID: 1.3.6.1.4.1.25623.1.0.100259)
The remote SSH Server supports the following SSH Protocol Versions:
1.99
2.0
SSHv2 Fingerprint: 38:82:77:7f:34:4d:52:f7:69:f0:8f:ee:32:d8:d4:0c
ssh (22/tcp)
Log (CVSS: 0.0)
NVT: SSH Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10267)
Detected SSH server version: SSH-2.0-OpenSSH_6.2
Remote SSH supported authentication: (not available)
Remote SSH banner: 
(not available)
CPE: cpe:/a:openbsd:openssh:6.2
Concluded from remote connection attempt with credentials:
  Login: OpenVAS
  Password: OpenVAS
ssh (22/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An ssh server is running on this port
sunrpc (111/tcp)
Log
NVT: (OID: 0)
Open port.
sunrpc (111/tcp)
Log (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
These are the registered RPC programs:
RPC program #100000 version 4 'portmapper' (portmap sunrpc rpcbind) on port 111/TCP
RPC program #100000 version 3 'portmapper' (portmap sunrpc rpcbind) on port 111/TCP
RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) on port 111/TCP
RPC program #100011 version 1 'rquotad' (rquotaprog quota rquota) on port 875/TCP
RPC program #100011 version 2 'rquotad' (rquotaprog quota rquota) on port 875/TCP
RPC program #100003 version 3 'nfs' (nfsprog) on port 2049/TCP
RPC program #100003 version 4 'nfs' (nfsprog) on port 2049/TCP
RPC program #100227 version 3 'nfs_acl' on port 2049/TCP
RPC program #100005 version 1 'mountd' (mount showmount) on port 20048/TCP
RPC program #100005 version 2 'mountd' (mount showmount) on port 20048/TCP
RPC program #100005 version 3 'mountd' (mount showmount) on port 20048/TCP
RPC program #100021 version 1 'nlockmgr' on port 47584/TCP
RPC program #100021 version 3 'nlockmgr' on port 47584/TCP
RPC program #100021 version 4 'nlockmgr' on port 47584/TCP
RPC program #100000 version 4 'portmapper' (portmap sunrpc rpcbind) on port 111/UDP
RPC program #100000 version 3 'portmapper' (portmap sunrpc rpcbind) on port 111/UDP
RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) on port 111/UDP
RPC program #100011 version 1 'rquotad' (rquotaprog quota rquota) on port 875/UDP
RPC program #100011 version 2 'rquotad' (rquotaprog quota rquota) on port 875/UDP
RPC program #100003 version 3 'nfs' (nfsprog) on port 2049/UDP
RPC program #100003 version 4 'nfs' (nfsprog) on port 2049/UDP
RPC program #100227 version 3 'nfs_acl' on port 2049/UDP
RPC program #100005 version 1 'mountd' (mount showmount) on port 20048/UDP
RPC program #100005 version 2 'mountd' (mount showmount) on port 20048/UDP
RPC program #100005 version 3 'mountd' (mount showmount) on port 20048/UDP
RPC program #100021 version 1 'nlockmgr' on port 42930/UDP
RPC program #100021 version 3 'nlockmgr' on port 42930/UDP
RPC program #100021 version 4 'nlockmgr' on port 42930/UDP
unknown (875/tcp)
Log (CVSS: 0.0)
NVT: Nfs-utils rpc.rquotad Service Detection (OID: 1.3.6.1.4.1.25623.1.0.802137)
  Summary:
  This script detects the running 'rpc.rquotad' service on the host.
  Vulnerability Insight:
  The flaw is due to error in the 'rpc.rquotad' service. If this service
  is running then disable it as it may become a security threat.
  Impact:
  Successful exploitation could allow attackers to execute to gain information
  about NFS services including user/system quotas.
  Impact Level: System
  Solution:
  No solution or patch is available as of 11th August, 2011. Information
  regarding this issue will be updated once the solution details are available.
  Workaround:
  Modify /etc/inetd.conf to disable the rpc.rquotad service.
References
CVE: CVE-1999-0625
Other:
URL:http://osvdb.org/show/osvdb/9726
URL:http://xforce.iss.net/xforce/xfdb/265
URL:http://www.exploitsearch.net/index.php?q=CVE-1999-0625
URL:http://www.iss.net/security_center/reference/vuln/rquotad.htm
This file was automatically generated.