[Wolves] nmap request

Ade binaryboy at blueyonder.co.uk
Fri Dec 26 22:19:44 GMT 2003


David Goodwin wrote:

>Can I ask nicely for it to be repeated please?
>
>  
>
>>laptop:/home/dan# nmap -sU codepoets.co.uk
>>    
>>
>
>
>My firewall should (from what I can understand from it) drop all incoming
>packets by default, apart from ssh, smtp and one or two others.... to me
>your scan doesn't indicate that.... hopefully it's fixed now....
>
>
>thanks,
>
>David.
>  
>
Here you go

Scan Details
Hosts which were alive and responding during test 	1
Number of security holes found 	0
Number of security warnings found 	2



Host List
Host(s) 	Possible Issue
81.168.107.198 <cid:part1.09010702.07070103 at blueyonder.co.uk> 	Security 
warning(s) found

[ return to top ] <cid:part2.01000005.06090302 at blueyonder.co.uk>


Analysis of Host
Address of Host 	Port/Service 	Issue regarding Port
81.168.107.198 	smtp (25/tcp) 
<cid:part3.04080204.06000506 at blueyonder.co.uk> 	Security notes found
81.168.107.198 	http (80/tcp) 
<cid:part4.01070608.08070809 at blueyonder.co.uk> 	Security warning(s) found
81.168.107.198 	domain (53/udp) 
<cid:part5.07030109.04050900 at blueyonder.co.uk> 	Security warning(s) found
81.168.107.198 	general/udp 
<cid:part6.01060804.04000201 at blueyonder.co.uk> 	Security notes found



Security Issues and Fixes: 81.168.107.198
Type 	Port 	Issue and Fix
Informational 	smtp (25/tcp) 	An SMTP server is running on this port
Here is its banner :
220 codepoets.co.uk ESMTP Postfix
Nessus ID : 10330 <http://cgi.nessus.org/nessus_id.php3?id=10330>
Informational 	smtp (25/tcp) 	Remote SMTP server banner :
220 codepoets.co.uk ESMTP Postfix



This is probably: Postfix
Nessus ID : 10263 <http://cgi.nessus.org/nessus_id.php3?id=10263>
Informational 	smtp (25/tcp) 	This server could be fingerprinted as 
being Postfix 2.0.3
Nessus ID : 11421 <http://cgi.nessus.org/nessus_id.php3?id=11421>
Warning 	http (80/tcp) 	
Your webserver supports the TRACE and/or TRACK methods. TRACE and TRACK
are HTTP methods which are used to debug web server connections.

It has been shown that servers supporting this method are subject
to cross-site-scripting attacks, dubbed XST for
"Cross-Site-Tracing", when used in conjunction with
various weaknesses in browsers.

An attacker may use this flaw to trick your
legitimate web users to give him their
credentials.

Solution: Disable these methods.


If you are using Apache, add the following lines for each virtual
host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

If you are using Microsoft IIS, use the URLScan tool to deny HTTP TRACE
requests or to permit only the methods needed to meet site requirements
and policy.

If you are using Sun ONE Web Server releases 6.0 SP2 and later, add the
following to the default object section in obj.conf:
<Client method="TRACE">
AuthTrans fn="set-variable"
remove-headers="transfer-encoding"
set-headers="content-length: -1"
error="501"
</Client>

If you are using Sun ONE Web Server releases 6.0 SP2 or below, compile
the NSAPI plugin located at:
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F50603


See http://www.whitehatsec.com/press_releases/WH-PR-20030120.pdf
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0035.html
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F50603
http://www.kb.cert.org/vuls/id/867593

Risk factor : Medium
Nessus ID : 11213 <http://cgi.nessus.org/nessus_id.php3?id=11213>
Informational 	http (80/tcp) 	A web server is running on this port
Nessus ID : 10330 <http://cgi.nessus.org/nessus_id.php3?id=10330>
Informational 	http (80/tcp) 	The following directories were discovered:
/cgi-bin, /doc, /icons, /manual

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

Nessus ID : 11032 <http://cgi.nessus.org/nessus_id.php3?id=11032>
Informational 	http (80/tcp) 	The following CGI have been discovered :

Syntax : cginame (arguments [default value])

/src/redirect.php (login_username [] secretkey [] js_autodetect_results 
[SMPREF_JS_OFF] just_logged_in [1] )

Nessus ID : 10662 <http://cgi.nessus.org/nessus_id.php3?id=10662>
Informational 	http (80/tcp) 	The remote web server type is :

Apache/2.0.48 (Unix) PHP/4.3.3 mod_jk/1.2.5


Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107 <http://cgi.nessus.org/nessus_id.php3?id=10107>
Informational 	http (80/tcp) 	An information leak occurs on Apache based 
web servers
whenever the UserDir module is enabled. The vulnerability allows an 
external
attacker to enumerate existing accounts by requesting access to their home
directory and monitoring the response.


Solution:
1) Disable this feature by changing 'UserDir public_html' (or whatever) to
'UserDir disabled'.

Or

2) Use a RedirectMatch rewrite rule under Apache -- this works even if 
there
is no such entry in the password file, e.g.:
RedirectMatch ^/~(.*)$ http://my-target-webserver.somewhere.org/$1

Or

3) Add into httpd.conf:
ErrorDocument 404 http://localhost/sample.html
ErrorDocument 403 http://localhost/sample.html
(NOTE: You need to use a FQDN inside the URL for it to work properly).

Additional Information:
http://www.securiteam.com/unixfocus/5WP0C1F5FI.html


Risk factor : Low
CVE : CAN-2001-1013 <http://cgi.nessus.org/cve.php3?cve=CAN-2001-1013>
BID : 3335 <http://cgi.nessus.org/bid.php3?bid=3335>
Nessus ID : 10766 <http://cgi.nessus.org/nessus_id.php3?id=10766>
Informational 	http (80/tcp) 	This web server was fingerprinted as: 
Apache/2.0.4x PHP/4.3.x
which is not consistent with the displayed banner: Apache/2.0.48 (Unix) 
PHP/4.3.3 mod_jk/1.2.5
Nessus ID : 11919 <http://cgi.nessus.org/nessus_id.php3?id=11919>
Warning 	domain (53/udp) 	
The remote name server allows recursive queries to be performed
by the host running nessusd.

If this is your internal nameserver, then forget this warning.

If you are probing a remote nameserver, then it allows anyone
to use it to resolve third parties names (such as www.nessus.org).
This allows hackers to do cache poisoning attacks against this
nameserver.

If the host allows these recursive queries via UDP,
then the host can be used to 'bounce' Denial of Service attacks
against another network or system.

See also : http://www.cert.org/advisories/CA-1997-22.html

Solution : Restrict recursive queries to the hosts that should
use this nameserver (such as those of the LAN connected to it).

If you are using bind 8, you can do this by using the instruction
'allow-recursion' in the 'options' section of your named.conf

If you are using bind 9, you can define a grouping of internal addresses
using the 'acl' command

Then, within the options block, you can explicitly state:
'allow-recursion { hosts_defined_in_acl }'

For more info on Bind 9 administration (to include recursion), see:
http://www.nominum.com/content/documents/bind9arm.pdf

If you are using another name server, consult its documentation.

Risk factor : Serious
CVE : CVE-1999-0024 <http://cgi.nessus.org/cve.php3?cve=CVE-1999-0024>
BID : 678 <http://cgi.nessus.org/bid.php3?bid=678>
Nessus ID : 10539 <http://cgi.nessus.org/nessus_id.php3?id=10539>
Informational 	domain (53/udp) 	
A DNS server is running on this port. If you do not use it, disable it.

Risk factor : Low
Nessus ID : 11002 <http://cgi.nessus.org/nessus_id.php3?id=11002>
Informational 	domain (53/udp) 	BIND 'NAMED' is an open-source DNS 
server from ISC.org.
Many proprietary DNS servers are based on BIND source code.

The BIND based NAMED servers (or DNS servers) allow remote users
to query for version and type information. The query of the CHAOS
TXT record 'version.bind', will typically prompt the server to send
the information back to the querying source.

The remote bind version is : 9.2.3

Solution :
Using the 'version' directive in the 'options' section will block
the 'version.bind' query, but it will not log such attempts.

Nessus ID : 10028 <http://cgi.nessus.org/nessus_id.php3?id=10028>
Informational 	domain (53/udp) 	The remote name server could be 
fingerprinted as being : ISC BIND 9.2.3

Nessus ID : 11951 <http://cgi.nessus.org/nessus_id.php3?id=11951>


-------------- next part --------------
Skipped content of type multipart/related


More information about the Wolves mailing list