SummaryThis document reports on the results of an automatic security scan. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue. Vendor security updates are not trusted. Overrides are on. When a result has an override, this report uses the threat of the override. Notes are included in the report. This report might not show details of all issues that were found. It only lists hosts that produced issues. Issues with the threat level "Debug" are not shown. This report contains all 19 results selected by the filtering described above. Before filtering there were 19 results.
Host Summary
Results per HostHost 127.0.0.1
Port Summary for Host 127.0.0.1
Security Issues for Host 127.0.0.1smtp (25/tcp)
High
(CVSS: 7.5)
NVT:
SendMail Mail Relay Vulnerability
(OID: 1.3.6.1.4.1.25623.1.0.802194)
Summary: This host is installed with SendMail and is prone to mail relay vulnerability. Vulnerability Insight: The flaw is due to an error in the mailconf module in Linuxconf which generates the Sendmail configuration file (sendmail.cf) and configures Sendmail to run as an open mail relay, which allows remote attackers to send Spam email. Impact: Successful exploitation will allow attackers to send email messages outside of the served network. This could result in unauthorized messages being sent from the vulnerable server. Impact Level: Application/System Affected Software/OS: Linuxconf versions 1.24 r2, 1.2.5 r3 Linuxconf versions 1.24 r2, 1.2.5 r3 on Conectiva Linux 6.0 through 8 IBM AIX versions 4.3, 4.3.1, 4.3.2, 4.3.3, 5.1, 5.1 L, 5.2 Solution: Upgrade to the latest version of Linuxconf version 1.29r1 or later For updates refer to http://www.solucorp.qc.ca/linuxconf/ For IBM AIX, apply the patch from below link ftp://aix.software.ibm.com/aix/efixes/security/sendmail_3_mod.tar.Z
References
general/tcp
Low
(CVSS: 0.0)
NVT:
Sendmail Version Detection
(OID: 1.3.6.1.4.1.25623.1.0.800608)
Sendmail version 8.14.7 was detected on the host smtp (25/tcp)
Low
(CVSS: 0.0)
NVT:
SMTP Server type and version
(OID: 1.3.6.1.4.1.25623.1.0.10263)
Remote SMTP server banner : 220 localhost.localdomain ESMTP Sendmail 8.14.7/8.14.7; Tue, 15 Oct 2013 07:07:02 -0400 This is probably: Sendmail general/CPE-T
Log
(CVSS: 0.0)
NVT:
CPE Inventory
(OID: 1.3.6.1.4.1.25623.1.0.810002)
127.0.0.1|cpe:/a:sendmail:sendmail:8.14.7 127.0.0.1|cpe:/a:openbsd:openssh:6.2 127.0.0.1|cpe:/o:linux:kernel general/HOST-T
Log
(CVSS: 0.0)
NVT:
Host Summary
(OID: 1.3.6.1.4.1.25623.1.0.810003)
traceroute:127.0.0.1 TCP ports:111,22,9390,25 UDP ports: general/tcp
Log
(CVSS: 0.0)
NVT:
OS fingerprinting
(OID: 1.3.6.1.4.1.25623.1.0.102002)
ICMP based OS fingerprint results: (92% confidence) Linux Kernel
References
general/tcp
Log
(CVSS: 0.0)
NVT:
Checks for open udp ports
(OID: 1.3.6.1.4.1.25623.1.0.103978)
Open UDP ports: [None found] general/tcp
Log
(CVSS: 0.0)
NVT:
Traceroute
(OID: 1.3.6.1.4.1.25623.1.0.51662)
Here is the route from 127.0.0.1 to 127.0.0.1: 127.0.0.1 general/tcp
Log
(CVSS: 0.0)
NVT:
Checks for open tcp ports
(OID: 1.3.6.1.4.1.25623.1.0.900239)
Open TCP ports: 111, 22, 9390, 25 otp (9390/tcp)
Log
NVT:
(OID: 0)
Open port. smtp (25/tcp)
Log
NVT:
(OID: 0)
Open port. smtp (25/tcp)
Log
(CVSS: 0.0)
NVT:
Services
(OID: 1.3.6.1.4.1.25623.1.0.10330)
An SMTP server is running on this port Here is its banner : 220 localhost.localdomain ESMTP Sendmail 8.14.7/8.14.7; Tue, 15 Oct 2013 07:06:58 -0400 ssh (22/tcp)
Log
NVT:
(OID: 0)
Open port. ssh (22/tcp)
Log
(CVSS: 0.0)
NVT:
SSH Protocol Versions Supported
(OID: 1.3.6.1.4.1.25623.1.0.100259)
The remote SSH Server supports the following SSH Protocol Versions: 1.99 2.0 SSHv2 Fingerprint: 38:82:77:7f:34:4d:52:f7:69:f0:8f:ee:32:d8:d4:0c ssh (22/tcp)
Log
(CVSS: 0.0)
NVT:
SSH Server type and version
(OID: 1.3.6.1.4.1.25623.1.0.10267)
Detected SSH server version: SSH-2.0-OpenSSH_6.2 Remote SSH supported authentication: (not available) Remote SSH banner: (not available) CPE: cpe:/a:openbsd:openssh:6.2 Concluded from remote connection attempt with credentials: Login: OpenVAS Password: OpenVAS ssh (22/tcp)
Log
(CVSS: 0.0)
NVT:
Services
(OID: 1.3.6.1.4.1.25623.1.0.10330)
An ssh server is running on this port sunrpc (111/tcp)
Log
NVT:
(OID: 0)
Open port. sunrpc (111/tcp)
Log
(CVSS: 0.0)
NVT:
rpcinfo -p
(OID: 1.3.6.1.4.1.25623.1.0.11111)
These are the registered RPC programs: RPC program #100000 version 4 'portmapper' (portmap sunrpc rpcbind) on port 111/TCP RPC program #100000 version 3 'portmapper' (portmap sunrpc rpcbind) on port 111/TCP RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) on port 111/TCP RPC program #100011 version 1 'rquotad' (rquotaprog quota rquota) on port 875/TCP RPC program #100011 version 2 'rquotad' (rquotaprog quota rquota) on port 875/TCP RPC program #100003 version 3 'nfs' (nfsprog) on port 2049/TCP RPC program #100003 version 4 'nfs' (nfsprog) on port 2049/TCP RPC program #100227 version 3 'nfs_acl' on port 2049/TCP RPC program #100005 version 1 'mountd' (mount showmount) on port 20048/TCP RPC program #100005 version 2 'mountd' (mount showmount) on port 20048/TCP RPC program #100005 version 3 'mountd' (mount showmount) on port 20048/TCP RPC program #100021 version 1 'nlockmgr' on port 47584/TCP RPC program #100021 version 3 'nlockmgr' on port 47584/TCP RPC program #100021 version 4 'nlockmgr' on port 47584/TCP RPC program #100000 version 4 'portmapper' (portmap sunrpc rpcbind) on port 111/UDP RPC program #100000 version 3 'portmapper' (portmap sunrpc rpcbind) on port 111/UDP RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) on port 111/UDP RPC program #100011 version 1 'rquotad' (rquotaprog quota rquota) on port 875/UDP RPC program #100011 version 2 'rquotad' (rquotaprog quota rquota) on port 875/UDP RPC program #100003 version 3 'nfs' (nfsprog) on port 2049/UDP RPC program #100003 version 4 'nfs' (nfsprog) on port 2049/UDP RPC program #100227 version 3 'nfs_acl' on port 2049/UDP RPC program #100005 version 1 'mountd' (mount showmount) on port 20048/UDP RPC program #100005 version 2 'mountd' (mount showmount) on port 20048/UDP RPC program #100005 version 3 'mountd' (mount showmount) on port 20048/UDP RPC program #100021 version 1 'nlockmgr' on port 42930/UDP RPC program #100021 version 3 'nlockmgr' on port 42930/UDP RPC program #100021 version 4 'nlockmgr' on port 42930/UDP unknown (875/tcp)
Log
(CVSS: 0.0)
NVT:
Nfs-utils rpc.rquotad Service Detection
(OID: 1.3.6.1.4.1.25623.1.0.802137)
Summary: This script detects the running 'rpc.rquotad' service on the host. Vulnerability Insight: The flaw is due to error in the 'rpc.rquotad' service. If this service is running then disable it as it may become a security threat. Impact: Successful exploitation could allow attackers to execute to gain information about NFS services including user/system quotas. Impact Level: System Solution: No solution or patch is available as of 11th August, 2011. Information regarding this issue will be updated once the solution details are available. Workaround: Modify /etc/inetd.conf to disable the rpc.rquotad service.
References
This file was automatically generated.
|