XX/XX/XXXX |
Report Summary | |||||||||||||||||||||||||
|
|
||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
Summary of Vulnerabilities |
|
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Vulnerabilities by Severity | |
Operating Systems Detected | |
Services Detected | |
Detailed Results |
XXX.XXX.XXX.XXX (demo01.treutler.de) | Linux 2.4-2.6 |
|
|
4
|
SSH Protocol Version 1 Supported |
port 22/tcp
|
Multiple vendors' implementations are vulnerable due to the fact that these are protocol design errors. Version 2 of the SSH protocol fixed these errors.
Note: Do not enable SSH Version 1 Fallback since systems with upgraded versions of SSH and with Fallback Version 1 enabled are still vulnerable.
SSH1 supported | yes |
Supported ciphers for SSH1 | 3des, blowfish |
Supported authentications for SSH1 | RSA, keyboard_interactive, password |
3
|
OpenSSH Key-Based Source IP Access Control Bypass Vulnerability |
port 22/tcp
|
OpenSSH is a secure remote access/command execution protocol.
One of the features offered by OpenSSH is the ability to implement access control based on source IP per key. This feature contains a bug that may allow for malicious users to bypass some access control and login from unauthorized hosts.
3
|
SSL Server Has SSLv2 Enabled Vulnerability |
port 443/tcp over SSL
|
There are known flaws in the SSLv2 protocol. A man-in-the-middle attacker can force the communication to a less secure level and then attempt to break the weak encryption. The attacker can also truncate encrypted messages.
These flaws have been fixed in SSLv3 (or TLSv1). Most servers (including all popular web-servers, mail-servers, etc.) and clients (including Web-clients like IE, Netscape Navigator and Mozilla and mail clients) support both SSLv2 and SSLv3. However, SSLv2 is enabled by default for backward compatibility.
The following links provide more information about this vulnerability:
Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
How to disable SSLv2 on IIS : Microsoft Knowledge Base Article - 187498
3
|
SSL Server Supports Weak Encryption Vulnerability |
port 443/tcp over SSL
|
SSL encryption ciphers are classified based on encryption key length as follows:
Messages encrypted with LOW encryption ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM or HIGH strength ciphers to guarantee transaction security.
The following link provide more information about this vulnerability:
Please note that this detection only checks for weak cipher support at the SSL layer. Some servers may implement additional protection at the data layer. For example, some SSL servers and SSL proxies (such as SSL accelerators) allow cipher negotiation to complete but send back an error message and abort further communication on the secure channel. This vulnerability may not be exploitable for such configurations.
Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
How to Control the Ciphers for SSL and TLS on IIS
How to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll
How to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in Internet Information Services
CIPHER | KEY-EXCHANGE | AUTHENTICATION | MAC | ENCRYPTION(KEY-STRENGTH) | GRADE |
SSLv2 WEAK CIPHERS | |||||
RC4-64-MD5 | RSA | RSA | MD5 | RC4(64) | LOW |
SSLv3 WEAK CIPHERS | |||||
EXP-RC4-MD5 | RSA(512) | RSA | MD5 | RC4(40) | LOW |
TLSv1 WEAK CIPHERS | |||||
EXP-RC4-MD5 | RSA(512) | RSA | MD5 | RC4(40) | LOW |
3
|
SSL Server Uses Weak Encryption Vulnerability |
port 443/tcp over SSL
|
SSL encryption ciphers are classified based on the encryption key length as follows:
Messages encrypted with LOW encryption ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM or HIGH strength ciphers to guarantee transaction security. SSL servers support a LOW grade cipher even though the client supports stronger ciphers.
The following links provide more information about this vulnerability:
Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
How to Control the Ciphers for SSL and TLS on IIS
CIPHER | KEY-EXCHANGE | AUTHENTICATION | MAC | ENCRYPTION(KEY-STRENGTH) | GRADE |
SSLv2 SELECTED THE FOLLOWING WEAK CIPHER | |||||
RC4-64-MD5 | RSA | RSA | MD5 | RC4(64) | LOW |
SSLv3 SELECTED THE FOLLOWING WEAK CIPHER | |||||
EXP1024-RC4-SHA | RSA(1024) | RSA | SHA1 | RC4(56) | LOW |
TLSv1 SELECTED THE FOLLOWING WEAK CIPHER | |||||
EXP1024-RC4-SHA | RSA(1024) | RSA | SHA1 | RC4(56) | LOW |
3
|
Web Server Brute Force Discovery of Unix Account Names Vulnerability |
port 80/tcp
|
If a request is made for an account that exists on the host, a 403 error is returned. If a request is made for a non-existent account, then a 404 error is returned.
UserDir Disabled
Apache Versions 1.3.9 and 1.3.12 are vulnerable. Other Web servers may also be vulnerable. There are currently no patches available. We strongly advise you to upgrade to a later version of Apache.
N. Server | Account |
root | |
gdm | |
operator | |
postgres |
3
|
Webalizer Web Usage Statistics Accessible |
port 80/tcp
|
The scanner found a Webalizer report on the target Web site.
3
|
AWStats Debug Remote Information Disclosure Vulnerability |
port 80/tcp
|
A remote information disclosure vulnerability reportedly affects AWStats. This issue is due to a failure of the application to properly validate access to sensitive data. The problem presents itself when the "debug" parameter with a value of "1" or "2" is included in a request that is supplied to the affected script.
3
|
Webalizer Web Usage Statistics Accessible |
port 443/tcp
|
The scanner found a Webalizer report on the target Web site.
3
|
AWStats Debug Remote Information Disclosure Vulnerability |
port 443/tcp
|
A remote information disclosure vulnerability reportedly affects AWStats. This issue is due to a failure of the application to properly validate access to sensitive data. The problem presents itself when the "debug" parameter with a value of "1" or "2" is included in a request that is supplied to the affected script.
3
|
Web Server Brute Force Discovery of Unix Account Names Vulnerability |
port 443/tcp
|
If a request is made for an account that exists on the host, a 403 error is returned. If a request is made for a non-existent account, then a 404 error is returned.
UserDir Disabled
Apache Versions 1.3.9 and 1.3.12 are vulnerable. Other Web servers may also be vulnerable. There are currently no patches available. We strongly advise you to upgrade to a later version of Apache.
N. Server | Account |
root | |
gdm | |
operator | |
postgres |
2
|
Global User List |
User Name | Source Vulnerability (TreutlerID) |
root | 5001 |
gdm | 5001 |
operator | 5001 |
postgres | 5001 |
2
|
TCP Sequence Number Approximation Based Denial of Service |
The cause of the vulnerability is that affected implementations will accept TCP sequence numbers within a certain range, known as the acknowledgement range, of the expected sequence number for a packet in the session. This is determined by the TCP window size, which is negotiated during the three-way handshake for the session. Larger TCP window sizes may be set to allow for more throughput, but the larger the TCP window size, the more probable it is to guess a TCP sequence number that falls within an acceptable range. It was initially thought that guessing an acceptable sequence number was relatively difficult for most implementations given random distribution, making this type of attack impractical. However, some implementations may make it easier to successfully approximate an acceptable TCP sequence number, making these attacks possible with a number of protocols and implementations.
This is further compounded by the fact that some implementations may support the use of the TCP Window Scale Option, as described in RFC 1323, to extend the TCP window size to a maximum value of 1 billion.
This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.
There are a few factors that may present viable target implementations, such as those which depend on long-lived TCP connections, those that have known or easily guessed IP address endpoints and those implementations with easily guessed TCP source ports. It has been noted that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack, due to the use of long-lived TCP sessions and the possibility that some implementations may use the TCP Window Scale Option. As a result, this issue is likely to affect a number of routing platforms.
Another factor to consider is the relative difficulty of injecting packets into TCP sessions, as a number of receiving implementations will reassemble packets in order, dropping any duplicates. This may make some implementations more resistant to attacks than others.
It should be noted that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further.
Various implementations and products including Check Point, Cisco, Cray Inc, Hitachi, Internet Initiative Japan, Inc (IIJ), Juniper Networks, NEC, Polycom, and Yamaha are currently undergoing review. Contact the vendors to obtain more information about affected products and fixes. NISCC Advisory 236929 - Vulnerability Issues in TCP details the vendor patch status as of the time of the advisory, and identifies resolutions and workarounds.
The Internet Engineering Task Force (IETF) has developed an Internet-Draft titled Transmission Control Protocol Security Considerations that addresses this issue.
Workaround:
The following BGP-specific workaround information has been provided.
For BGP implementations that support it, the TCP MD5 Signature Option should be enabled. Passwords that the MD5 checksum is applied to should be set to strong values and changed on a regular basis.
Secure BGP configuration instructions have been provided for Cisco and Juniper at these locations:
http://www.cymru.com/Documents/secure-bgp-template.html
http://www.qorbit.net/documents/junos-bgp-template.pdf
2
|
UDP Constant IP Identification Field Fingerprinting Vulnerability |
Normally, the IP Identification field is intended to be a reasonably unique value, and is used to reconstruct fragmented packets. It has been reported that in some versions of the 2.4 Linux kernel IP stack implementation, UDP packets are transmitted with a constant IP Identification field of 0.
2
|
Hidden RPC Services |
When the portmapper/rpcbind is removed or firewalled, standard RPC client programs fail to obtain the portmapper list. However, by sending carefully crafted packets, it's possible to determine which RPC programs are listening on which port. This technique is known as direct RPC scanning. It's used to bypass portmapper/rpcbind in order to find RPC programs running on a port (TCP or UDP ports). On Linux servers, RPC services are typically listening on privileged ports (below 1024), whereas on Solaris, RPC services are on temporary ports (starting with port 32700).
Name | Program | Version | Protocol | Port |
portmap/rpcbind | 100000 | 2 | tcp | 111 |
2
|
SSL Certificate - Expired |
port 443/tcp over SSL
|
A certificate with a past end date cannot be trusted.
2
|
SSL Certificate - Self-Signed Certificate |
port 443/tcp over SSL
|
The client can trust that the Server Certificate belongs the server only if it is signed by a mutually trusted third-party Certificate Authority (CA). Self-signed certificates are created generally for testing purposes or to avoid paying third-party CAs. These should not be used on any production or critical servers.
By exploiting this vulnerability, an attacker can impersonate the server by presenting a fake self-signed certificate. If the client knows that the server does not have a trusted certificate, it will accept this spoofed certificate and communicate with the remote server.
2
|
SSL Certificate - Subject Common Name Does Not Match Server FQDN |
port 443/tcp over SSL
|
A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.
2
|
SSL Certificate - Signature Verification Failed Vulnerability |
port 443/tcp over SSL
|
If a client is unable to verify the certificate, it can abort communication or prompt the user to continue the communication without authentication.
Exception:
If the server communicates only with a restricted set of clients who have the server certificate or the trusted CA certificate, then the server or CA certificate may not be available publicly, and the scan will be unable to verify the signature.
2
|
SSL Certificate - Improper Usage Vulnerability |
port 443/tcp over SSL
|
The basicConstraints section of the certificate may specify if it is a Certificate Authority (CA) certificate. Also, the keyUsage field in the X509v3 extensions section of the certificate, if present, may restrict the usage of the certificate.
In general, a server public key should not be used for Certificate or CRL signing and a client or CA certificate should be not used as a server certificate.
2
|
Netscape/OpenSSL Cipher Forcing Bug |
port 443/tcp over SSL
|
OpenSSL contains this bug if the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option is enabled during runtime. This option was introduced for compatibility reasons.
The problem arises when different applications using OpenSSL's libssl library enable all compatibility options including SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG, thus enabling the bug.
#define SSL_OP_ALL (0x00000FFFL^SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG)
The library and all programs using this library need to be recompiled to ensure that the correct OpenSSL library is used during linking.
2
|
Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability |
port 80/tcp
|
A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.
The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.
Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.
The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.
Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule .* - [F] </IfModule>With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.
A slightly tighter fix is to use:
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$ RewriteRule .* - [F] </IfModule>
Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.
URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.
Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.
For more details about other web servers : Cert Advisory.
2
|
Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability |
port 443/tcp
|
A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.
The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.
Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.
The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.
Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule .* - [F] </IfModule>With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.
A slightly tighter fix is to use:
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$ RewriteRule .* - [F] </IfModule>
Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.
URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.
Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.
For more details about other web servers : Cert Advisory.
1
|
ICMP Timestamp Request |
However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) are necessary for proper behavior of Operating System TCP/IP stacks.
It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.
1
|
Apache Web Server ETag Header Information Disclosure Weakness |
port 80/tcp
|
A cache management feature for Apache makes use of an entity tag (ETag) header. When this option is enabled and a request is made for a document relating to a file, an ETag response header is returned containing various file attributes for caching purposes. ETag information allows subsequent file requests to contain specific information, such as the file's inode number.
A weakness has been found in the generation of ETag headers under certain configurations implementing the FileETag directive. Among the file attributes included in the header is the file inode number that is returned to a client. In Apache Versions 1.3.22 and earlier, it's not possible to disable inodes in in ETag headers. In later versions, the default behavior is to release this sensitive information.
Customers are advised to upgrade to the latest version of Apache. In Apache Version 1.3.27 and later, it's possible to configure the FileETag directive to generate ETag headers without inode information. To do so, include "FileETag -INode" in the Apache server configuration file for a specific subdirectory.
In order to fix this vulnerability globally, for the Web server, use the option "FileETag None". Use the option "FileETag MTime Size" if you just want to remove the Inode information.
1
|
Expose_php Set to On in php.ini |
port 80/tcp
|
1
|
Apache Web Server ETag Header Information Disclosure Weakness |
port 443/tcp
|
A cache management feature for Apache makes use of an entity tag (ETag) header. When this option is enabled and a request is made for a document relating to a file, an ETag response header is returned containing various file attributes for caching purposes. ETag information allows subsequent file requests to contain specific information, such as the file's inode number.
A weakness has been found in the generation of ETag headers under certain configurations implementing the FileETag directive. Among the file attributes included in the header is the file inode number that is returned to a client. In Apache Versions 1.3.22 and earlier, it's not possible to disable inodes in in ETag headers. In later versions, the default behavior is to release this sensitive information.
Customers are advised to upgrade to the latest version of Apache. In Apache Version 1.3.27 and later, it's possible to configure the FileETag directive to generate ETag headers without inode information. To do so, include "FileETag -INode" in the Apache server configuration file for a specific subdirectory.
In order to fix this vulnerability globally, for the Web server, use the option "FileETag None". Use the option "FileETag MTime Size" if you just want to remove the Inode information.
1
|
Expose_php Set to On in php.ini |
port 443/tcp
|
5
|
OpenSSH Multiple Memory Management Vulnerabilities |
port 22/tcp
|
Many vendors backport the patches to packages based on earlier versions of
openssh. The following packages have been reported to address this issue:
Solaris 9 SPARC: patch 113273-04 or later
Solaris 9 x86: patch 114858-03 or later
AIX-5.2 opensshi-aix52 3.6.1p2_52
AIX-5.1 opensshi-aix51 3.6.1p2_51
HP-UX B.11.22 T1471AA_A.03.61.002_HP-UX_B.11.22_IA.depot
HP-UX B.11.11 T1471AA_A.03.61.002_HP-UX_B.11.11_32+64.depot
HP-UX B.11.00 T1471AA_A.03.61.002_HP-UX_B.11.00_32+64.depot
redhat: openssh-3.1p1-14
fedora: openssh-3.6.1p2-19
mandrake: openssh-3.6.1p2-1.1
debian: openssh-krb5_3.4p1
suse-8.2: openssh-3.5p1-106
suse-8.1, 8-0: openssh-3.4p1-214
Mac OS X 10.2.8
As a workaround, configure OpenSSH to run with privilege separation. This configuration will reduce the impact of any latent vulnerabilities.
5
|
OpenSSH Channel Code Off-By-One Vulnerability |
port 22/tcp
|
A vulnerability has been announced in some versions of OpenSSH. An off-by-one error exists in the channel code. It has been reported that a local user can exploit this vulnerability by connecting to a vulnerable server (valid credentials are required). Additionally, a malicious server may attack a vulnerable OpenSSH client.
diff -u -r1.170 -r1.171
--- channels.c 27 Feb 2002 21:23:13 -0000 1.170
+++ channels.c 4 Mar 2002 19:37:58 -0000 1.171
@@ -146,7 +146,7 @@<BR>
{
Channel *c;
-
if (id < 0 || id > channels_alloc) {
+ if (id < 0 || id >= channels_alloc) {
log("channel_lookup: %d: bad id", id);
return NULL;
}
Updated versions are available at the following web site : www.openssh.com
5
|
OpenSSH Challenge-Response Authentication Integer Overflow Vulnerability |
port 22/tcp
|
A vulnerability exists within the "challenge-response" authentication mechanism in the OpenSSH daemon (sshd). This mechanism, part of the SSH2 protocol, verifies a user's identity by generating a challenge and forcing the user to supply a number of responses.
OpenSSH supports the SKEY and BSD_AUTH authentication options. These are compile-time options. At least one of these options must be enabled before the OpenSSH binaries are compiled for the vulnerable condition to be present. OpenBSD 3.0 and later is distributed with BSD_AUTH enabled. The SKEY and BSD_AUTH options are not enabled by default in many distributions. However, if these options are explicitly enabled, that build of OpenSSH may be vulnerable.
Note: Systems running with 'ChallengeResponseAuthentication no' are not affected.
You should do something like the following to prepare the privsep preauth environment:
# mkdir /var/empty
# chown root:sys /var/empty
# chmod 755 /var/empty
# groupadd sshd
# useradd -g sshd sshd
Set the following in your '/etc/ssh/sshd_config' file:
UsePrivilegeSeparation yes
5
|
PHP Post File Upload Buffer Overflow Vulnerability |
port 80/tcp
|
PHP does not perform proper bounds checking on functions related to Form-based File Uploads in HTML (RFC1867). Specifically, this problem occurs in the functions used to decode MIME encoded files.
PHP is invoked through Web servers remotely. It may be possible for remote attackers to exploit this vulnerability to gain access to target systems. A vulnerable PHP interpreter module, which is available for Apache servers, is often enabled by default.
5
|
PHP Strip_Tags() Function Bypass and Heap Overflow Vulnerability |
port 80/tcp
|
It is reported that it's possible to bypass the PHP strip_tags() function. By including ' 0' (NULL character) characters in HTML tags, it is reported that the PHP strip_tags() function will improperly leave tags in place. Although these tags are invalid HTML and are normally ignored by browsers, it is reported that Microsoft Internet Explorer and Apple Safari both discard the ' 0' (NULL) characters and interpret the tags.
This vulnerability may mean that previously presumed-safe Web applications could contain multiple cross-site scripting and HTML injection vulnerabilities when viewed by Microsoft Internet Explorer or Apple Safari.
It is reported that "magic_quotes_gpc" must be off for PHP to be vulnerable to this issue.
Various errors within PHP's memory_limit request termination (for example, when allocating Zend HashTables before proper initialization) can be exploited to execute arbitrary code by corrupting the heap (for example, supplying arbitrary HashTable destructor pointers).
Successful exploitation requires that a resource limit has been set using the "memory_limit" configuration directive.
By exploiting "memory_limit", attackers may execute an arbitrary code.
5
|
PHP Post File Upload Buffer Overflow Vulnerability |
port 443/tcp
|
PHP does not perform proper bounds checking on functions related to Form-based File Uploads in HTML (RFC1867). Specifically, this problem occurs in the functions used to decode MIME encoded files.
PHP is invoked through Web servers remotely. It may be possible for remote attackers to exploit this vulnerability to gain access to target systems. A vulnerable PHP interpreter module, which is available for Apache servers, is often enabled by default.
5
|
PHP Strip_Tags() Function Bypass and Heap Overflow Vulnerability |
port 443/tcp
|
It is reported that it's possible to bypass the PHP strip_tags() function. By including ' 0' (NULL character) characters in HTML tags, it is reported that the PHP strip_tags() function will improperly leave tags in place. Although these tags are invalid HTML and are normally ignored by browsers, it is reported that Microsoft Internet Explorer and Apple Safari both discard the ' 0' (NULL) characters and interpret the tags.
This vulnerability may mean that previously presumed-safe Web applications could contain multiple cross-site scripting and HTML injection vulnerabilities when viewed by Microsoft Internet Explorer or Apple Safari.
It is reported that "magic_quotes_gpc" must be off for PHP to be vulnerable to this issue.
Various errors within PHP's memory_limit request termination (for example, when allocating Zend HashTables before proper initialization) can be exploited to execute arbitrary code by corrupting the heap (for example, supplying arbitrary HashTable destructor pointers).
Successful exploitation requires that a resource limit has been set using the "memory_limit" configuration directive.
By exploiting "memory_limit", attackers may execute an arbitrary code.
5
|
OpenSSL Timing Attack RSA Private Key Information Disclosure Vulnerability |
port 443/tcp
|
A side-channel attack in the OpenSSL implementation has been published in a recent paper that may ultimately result in an active adversary gaining the RSA private key of a target server. The attack involves analysis of the timing of certain operations during client-server session key negotiation.
Session negotiation occurs using the RSA PKCS 1 type public key cryptography standard. During the client-server negotiation, the client constructs a proto-session-key using PKCS 1 formatted random bytes and encrypts it with the RSA public key of the server. The client then transmits this value to the server, which uses it to compute the shared session key. The server will generate a session key on its own and send an alert message to the client if the client-supplied proto-key decrypted by the server using its RSA private key is not properly PKCS 1 formatted.
It is possible for an adversary, acting as a client, to obtain bits of information about the server RSA private key by observing the time elapsed between the transmission of an invalid proto-key value and reception of the alert message from the server that is sent in response. The information is leaked during the decryption process and may, through successive observations, reveal the factorization of the private key to the adversary. An attacker may perform this attack by repeatedly establishing sessions with invalid proto-key values.
This problem affects many applications using OpenSSL. In particular, almost all SSL-enabled Apaches. You should rebuild and reinstall OpenSSL, and all affected applications.
4
|
OpenSSH UseLogin Environment Variable Passing Vulnerability |
port 22/tcp
|
A problem has been discovered in OpenSSH that could allow local users to gain elevated privileges. OpenSSH allows for certain environment variables to be set when users log in with specific keys. When the server is configured to use 'login' via the 'UseLogin' config flag, these environment variables are set for the 'login' process.
If the 'UseLogin' flag is set, local users can gain root privileges. UseLogin is not enabled by default.
4
|
Apache Web Server Type-Map Recursive Loop Denial of Service Vulnerability |
port 80/tcp
|
Apache content negotiation functionality has been reported prone to a denial of service vulnerability. The issue may present itself, if an attacker has the ability to create a malicious type-map file. The attacker may craft the type-map file in a manner sufficient to cause the vulnerable server to fall into an infinite loop.
4
|
PHP4 Multiple Vulnerabilities |
port 80/tcp
|
PHP released an upgrade to address multiple vulnerabilities, including integer overflow issues reported to affect PHP4 and bundled software. Vulnerable functions that were fixed include base64_encode(), bundled GD library functions, ibase_blob_get() etc. A complete list of security fixes can be found in the PHP4 ChangeLog for version 4.3.3. Exploitation of many of these issues may require third-party Web applications (that use the PHP4 web development suite) to directly accept input passed to internal functions in PHP.
4
|
Apache Mod_SSL Buffer Overflow Vulnerability |
port 443/tcp
|
Mod_SSL is an implementation of SSL (Secure Socket Layer) for the Apache Web server. Mod_SSL contains a buffer overflow vulnerability that could allow malicious users to execute arbitrary code. The overflow exists when Mod_SSL attempts to cache an SSL session. Vulnerable versions of Mod_SSL are incapable of handling large session representations.
To exploit this vulnerability, the malicious user must somehow increase the size of the data representing the session. This can be accomplished through the use of an extremely large client certificate. However, this is only possible if verification of client certificates is enabled, and if the certificates are verified by Certificate Authorities who are trusted by the Web server.
4
|
Apache Web Server Type-Map Recursive Loop Denial of Service Vulnerability |
port 443/tcp
|
Apache content negotiation functionality has been reported prone to a denial of service vulnerability. The issue may present itself, if an attacker has the ability to create a malicious type-map file. The attacker may craft the type-map file in a manner sufficient to cause the vulnerable server to fall into an infinite loop.
4
|
PHP4 Multiple Vulnerabilities |
port 443/tcp
|
PHP released an upgrade to address multiple vulnerabilities, including integer overflow issues reported to affect PHP4 and bundled software. Vulnerable functions that were fixed include base64_encode(), bundled GD library functions, ibase_blob_get() etc. A complete list of security fixes can be found in the PHP4 ChangeLog for version 4.3.3. Exploitation of many of these issues may require third-party Web applications (that use the PHP4 web development suite) to directly accept input passed to internal functions in PHP.
3
|
OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability |
port 22/tcp
|
A vulnerability has been reported for OpenSSH that may allow unauthorized access to an OpenSSH server's login mechanism. The vulnerability exists in the way OpenSSH restricts access. It's possible to configure OpenSSH to restrict access based on certain hostname or IP address patterns. When a connection is made to an OpenSSH server, a reverse DNS lookup is made to verify the hostname. Access to the login mechanism is then granted based on the lookup response.
An attacker who controls a malicious DNS server may be capable of spoofing a PTR record to mimic the hostname of an authorized user. Furthermore, by using a record containing an IP address of a trusted host, it may also be possible to bypass the access control.
3
|
Apache HTTP Server Multiple Vulnerabilities |
port 80/tcp
|
Apache HTTP Server Version 1.3.28 was released in response to multiple vulnerabilities. Apache is vulnerable to three potential security issues. The impact of these vulnerabilities includes denial of service, file descriptor leakage, and logging failures.
Attackers may also be able to send specially crafted requests that cause Apache to go into an internal loop and eventually crash.
Under certain circumstances, Apache may leak file descriptors from a parent process to a child process. This could result in varying degrees of unauthorized access.
Under Windows and OS/2 systems, it may be possible to cause Apache to send special control characters over a pipe. This could potentially cause Apache to cease logging and exit (CAN-2003-0460).
3
|
Apache HTTP Server Buffer Overflow Vulnerabilities In mod_alias And mod_rewrite |
port 80/tcp
|
The vulnerability exists in the modules "mod_alias" and "mod_rewrite". These modules improperly handle regular expressions containing more than nine capturing parentheses. A local attacker could create a specially-crafted configuration file with such expressions to be used by the modules.
For Apache based IBM HTTP Servers, IBM has released a cumulative patch which fixes these issues as well as a few other issues. Please visit http://www-1.ibm.com/support/docview.wss?rs=177&context=SSEQTJ&uid=swg24006719 for information and the patch.
3
|
Multiple Apache 1.3.32 And Earlier Web Server Local Buffer Overflow Vulnerabilities |
port 80/tcp
|
A potential buffer overflow with escaped characters in the SSI tag string is reported. The vulnerability is caused due to a boundary error in the "get_tag()" function of the "mod_include" module. This issue can be exploited to cause a buffer overflow when a specially crafted document with malformed server-side includes is requested through an HTTP session.
Heap-based buffer overflow in "proxy_util.c" for "mod_proxy" in Apache allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
3
|
PHP Multiple Remote Vulnerabilities |
port 80/tcp
|
PHP4 and PHP5 are reported prone to multiple remotely exploitable vulnerabilities. These issue result from insufficient sanitization of user-supplied data. A remote attacker may carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations.
The following issues were identified:
PHP4 is reported prone to a directory traversal vulnerability. It is reported that this issue arises in the default configuration, which is shipped with the "magic_quotes_gpc" directive set to "On". This setting invokes the "addslashes()" function to sanitize all user-supplied input. The issue presents itself as a NULL byte is not properly sanitized by the "addslashes()" function. This allows an attacker to bypass input restrictions and carry out directory traversal attacks by appending a NULL byte to an HTTP GET request containing "../" type directory traversal sequences.
PHP4 and PHP5 are reported prone to a vulnerability that allows an attacker to upload a file to an arbitrary location. This issue also arises when the "magic_quotes_gpc" directive set to "On". Reportedly, an attacker can upload a file to an arbitrary location by including a single quote "'" in the file name preceded by ".." type directory traversal sequences. Apparently the "addslashes()" function replaces the single quote with a back slash resulting in the file being placed in a lower level of the directory tree.
If successfully exploited, the second issue may allow the attacker to place files in arbitrary locations. This can potentially replace existing files and lead to data corruption or other attacks.
3
|
Gregory Trubetskoy mod_python Imported Module Access Vulnerability |
port 80/tcp
|
An issue has been reported with the mod_python publisher, which may allow a malicious user to access any function in any module that has been included by a previously called script. This includes the standard Python libraries.
The mod_python publisher can be used to map URL information directly into a Python module and function. Path information is used to locate the appropriate module and directory, and CGI parameters are passed directly as function parameters.
At a minimum, default Python libraries will allow a malicious user to create directories on the host system. Greater risks may result from additional modules or third-party code, which may be called in an unintended manner. For example, a database wrapper module may not perform authentication checking on the assumption that it would not be called by an untrusted source.
Exploitation of this vulnerability requires that a script has been previously imported. Reportedly, this is done on a per child process basis under Apache. As a result, exploitation may be sensitive to the ability to access the same child process multiple times.
Workaround: Including the following line at the top of sensitive modules will prevent direct access:
__auth__ = {}
3
|
PHP Group PHP Remote JPEG File Format Remote Denial of Service Vulnerability |
port 80/tcp
|
The problem presents itself when the affected application attempts to parse a maliciously crafted JPEG file. This occurs due to a failure to properly validate image header data in the "php_handle_jpeg()" function defined in "ext/standard/image.c" prior to using it to control loop iteration.
Apparently, when a file contains an invalid marker value the process can be forced into an infinite loop. The application will read an invalid marker, determine that it is invalid, and call the "php_skip_variable()" function to bypass it. If the marker causes the "php_skip_variable()" function to read to the end of the JPEG file, flawed file stream pointer manipulation will cause the file stream pointer to be placed two bytes from the end of the file. When the application attempts to read the next marker, it finds it to be invalid, and the process repeats, triggering an infinite loop. Note that this vulnerability can only be exploited remotely if a Web-based PHP application allows user-supplied images to be processed by the "getimagesize()" function. This function is commonly implemented in PHP Web applications that allow the display of images.
3
|
Apache HTTP Server Multiple Vulnerabilities |
port 443/tcp
|
Apache HTTP Server Version 1.3.28 was released in response to multiple vulnerabilities. Apache is vulnerable to three potential security issues. The impact of these vulnerabilities includes denial of service, file descriptor leakage, and logging failures.
Attackers may also be able to send specially crafted requests that cause Apache to go into an internal loop and eventually crash.
Under certain circumstances, Apache may leak file descriptors from a parent process to a child process. This could result in varying degrees of unauthorized access.
Under Windows and OS/2 systems, it may be possible to cause Apache to send special control characters over a pipe. This could potentially cause Apache to cease logging and exit (CAN-2003-0460).
3
|
Apache HTTP Server Buffer Overflow Vulnerabilities In mod_alias And mod_rewrite |
port 443/tcp
|
The vulnerability exists in the modules "mod_alias" and "mod_rewrite". These modules improperly handle regular expressions containing more than nine capturing parentheses. A local attacker could create a specially-crafted configuration file with such expressions to be used by the modules.
For Apache based IBM HTTP Servers, IBM has released a cumulative patch which fixes these issues as well as a few other issues. Please visit http://www-1.ibm.com/support/docview.wss?rs=177&context=SSEQTJ&uid=swg24006719 for information and the patch.
3
|
Multiple Apache 1.3.32 And Earlier Web Server Local Buffer Overflow Vulnerabilities |
port 443/tcp
|
A potential buffer overflow with escaped characters in the SSI tag string is reported. The vulnerability is caused due to a boundary error in the "get_tag()" function of the "mod_include" module. This issue can be exploited to cause a buffer overflow when a specially crafted document with malformed server-side includes is requested through an HTTP session.
Heap-based buffer overflow in "proxy_util.c" for "mod_proxy" in Apache allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
3
|
Apache Mod_SSL Log Function Format String Vulnerability |
port 443/tcp
|
mod_ssl is affected by a format string vulnerability within its logging function. This issue is due to a failure of the application to properly implement a formatted string function. The problem is reported to present itself due to an improperly implemented call to the "ssl_log()" function. Apparently, user input is provided as the format string to the affected function, facilitating attacker control of format specifiers. The offending call is located within the "mod_proxy" hook functions. It is currently not known where the user input is derived.
3
|
PHP Multiple Remote Vulnerabilities |
port 443/tcp
|
PHP4 and PHP5 are reported prone to multiple remotely exploitable vulnerabilities. These issue result from insufficient sanitization of user-supplied data. A remote attacker may carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations.
The following issues were identified:
PHP4 is reported prone to a directory traversal vulnerability. It is reported that this issue arises in the default configuration, which is shipped with the "magic_quotes_gpc" directive set to "On". This setting invokes the "addslashes()" function to sanitize all user-supplied input. The issue presents itself as a NULL byte is not properly sanitized by the "addslashes()" function. This allows an attacker to bypass input restrictions and carry out directory traversal attacks by appending a NULL byte to an HTTP GET request containing "../" type directory traversal sequences.
PHP4 and PHP5 are reported prone to a vulnerability that allows an attacker to upload a file to an arbitrary location. This issue also arises when the "magic_quotes_gpc" directive set to "On". Reportedly, an attacker can upload a file to an arbitrary location by including a single quote "'" in the file name preceded by ".." type directory traversal sequences. Apparently the "addslashes()" function replaces the single quote with a back slash resulting in the file being placed in a lower level of the directory tree.
If successfully exploited, the second issue may allow the attacker to place files in arbitrary locations. This can potentially replace existing files and lead to data corruption or other attacks.
3
|
Gregory Trubetskoy mod_python Imported Module Access Vulnerability |
port 443/tcp
|
An issue has been reported with the mod_python publisher, which may allow a malicious user to access any function in any module that has been included by a previously called script. This includes the standard Python libraries.
The mod_python publisher can be used to map URL information directly into a Python module and function. Path information is used to locate the appropriate module and directory, and CGI parameters are passed directly as function parameters.
At a minimum, default Python libraries will allow a malicious user to create directories on the host system. Greater risks may result from additional modules or third-party code, which may be called in an unintended manner. For example, a database wrapper module may not perform authentication checking on the assumption that it would not be called by an untrusted source.
Exploitation of this vulnerability requires that a script has been previously imported. Reportedly, this is done on a per child process basis under Apache. As a result, exploitation may be sensitive to the ability to access the same child process multiple times.
Workaround: Including the following line at the top of sensitive modules will prevent direct access:
__auth__ = {}
3
|
PHP Group PHP Remote JPEG File Format Remote Denial of Service Vulnerability |
port 443/tcp
|
The problem presents itself when the affected application attempts to parse a maliciously crafted JPEG file. This occurs due to a failure to properly validate image header data in the "php_handle_jpeg()" function defined in "ext/standard/image.c" prior to using it to control loop iteration.
Apparently, when a file contains an invalid marker value the process can be forced into an infinite loop. The application will read an invalid marker, determine that it is invalid, and call the "php_skip_variable()" function to bypass it. If the marker causes the "php_skip_variable()" function to read to the end of the JPEG file, flawed file stream pointer manipulation will cause the file stream pointer to be placed two bytes from the end of the file. When the application attempts to read the next marker, it finds it to be invalid, and the process repeats, triggering an infinite loop. Note that this vulnerability can only be exploited remotely if a Web-based PHP application allows user-supplied images to be processed by the "getimagesize()" function. This function is commonly implemented in PHP Web applications that allow the display of images.
3
|
OpenSSL CBC Error Information Leakage Weakness |
port 443/tcp
|
A side-channel attack against some implementations of SSL exists that, through analysis of the timing of certain operations, can reveal sensitive information to an active adversary.
The weakness in the OpenSSL implementation is that it did not compute message authentication codes for packets with invalid block cipher padding. By analyzing the time it takes for the server to transmit an error response to ciphertext blocks injected into a session by an attacker, adversaries could feasibly infer whether the block error is due to invalid block cipher padding or invalid MAC.
The OpenSSL development team has reduced the information leakage by calculating MACs for packets with invalid block cipher padding in Version 0.9.6i and 0.9.7a. It is not known if other implementations are vulnerable to this or similar weaknesses.
3
|
OpenSSL Unknown Message Type Infinite Loop Denial of Service Vulnerability |
port 443/tcp
|
This vulnerability was addressed in OpenSSL Versions 0.9.6d and 0.9.7.
Any application dynamically linked to OpenSSL libraries should be restarted after applying fixes. Applications that are statically linked to OpenSSL libraries should be recompiled after upgrading OpenSSL.
2
|
Apache HTDigest Realm Command Line Argument Buffer Overflow Vulnerability |
port 80/tcp
|
A buffer overflow vulnerability exists in the "htdigest" utility included with Apache. The vulnerability is due to improper bounds checking when copying user-supplied realm data into local buffers.
By supplying an overly long realm value to command line options of "htdigest", it's possible to trigger an overflow condition. This may cause memory to be corrupted with attacker-specified values.
However, this may be an issue if "htdigest" is called from a CGI script. An attacker may be able to supply malformed data to the program which will cause the overflow to occur.
Workaround:
Exposure to this and other security issues may be reduced if administrators avoid situations that require "htdigest" to be called from a CGI script.
2
|
Apache mod_php Global Variables Information Disclosure Weakness |
port 80/tcp
|
A weakness has been reported to exist in the Apache mod_php module that may allow remote attackers to disclose sensitive information by influencing global variables. The issue reportedly presents itself when the php.ini configuration file has the parameter setting "register_globals = on".
emerge sync emerge -pv ">=dev-php/mod_php-4.3.4-r4" emerge ">=dev-php/mod_php-4.3.4-r4"
2
|
Apache HTDigest Realm Command Line Argument Buffer Overflow Vulnerability |
port 443/tcp
|
A buffer overflow vulnerability exists in the "htdigest" utility included with Apache. The vulnerability is due to improper bounds checking when copying user-supplied realm data into local buffers.
By supplying an overly long realm value to command line options of "htdigest", it's possible to trigger an overflow condition. This may cause memory to be corrupted with attacker-specified values.
However, this may be an issue if "htdigest" is called from a CGI script. An attacker may be able to supply malformed data to the program which will cause the overflow to occur.
Workaround:
Exposure to this and other security issues may be reduced if administrators avoid situations that require "htdigest" to be called from a CGI script.
2
|
Apache mod_php Global Variables Information Disclosure Weakness |
port 443/tcp
|
A weakness has been reported to exist in the Apache mod_php module that may allow remote attackers to disclose sensitive information by influencing global variables. The issue reportedly presents itself when the php.ini configuration file has the parameter setting "register_globals = on".
emerge sync emerge -pv ">=dev-php/mod_php-4.3.4-r4" emerge ">=dev-php/mod_php-4.3.4-r4"
2
|
Operating System Detected |
1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.
Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.
2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).
3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.
4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.
Operating System | Technique | ID |
Linux 2.4-2.6 | TCP/IP Fingerprint | U1117:22 |
2
|
Host Uptime Guess Based on TCP TimeStamp Option |
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.
2
|
Open RPC Services List |
port 111/tcp
|
program | version | protocol | port | name |
100000 | 2 | udp | 111 | rpcbind |
100000 | 2 | tcp | 111 | rpcbind |
2
|
Web Server Probed For Various URL-Encoding Schemes Supported |
port 80/tcp
|
Per this paper by Daniel Roelker that was presented at Defcon 11, popular Web servers like Microsoft IIS support a variety of encoding schemes for the URLs. These include Percent-escaped Hex Encoding, Double-percent Escaped Hex Encoding, Microsoft's %U Encoding, Percent-escaped 2-Byte UTF-8 Encoding, and Raw 2-Byte UTF-8 Encoding.
For a sample HTTP GET request, GET /. HTTP/1.0, the following illustrates the encoded URI under these schemes:
Percent-escaped Hex Encoding: GET /%2e HTTP/1.0 Double-percent Escaped Hex Encoding: GET /%252e HTTP/1.0 Percent-escaped 2-Byte UTF-8 Encoding: GET /%C0%AE HTTP/1.0 Raw 2-Byte UTF-8 Encoding: GET /\xC0\xAE HTTP/1.0 (Actual raw 0xC0 and 0xAE bytes) Microsoft's %U Encoding: GET /%u002e HTTP/1.0
The supported encoding schemes are listed in the Results section.
URI encoding is relevant to Web server security since, as mentioned in the paper above, attackers could launch HTTP attacks while at the same time obfuscating the URIs to evade detection by Intrusion Detection Systems that are not capable of decoding the URIs.
2
|
Web Server Probed For Various URL-Encoding Schemes Supported |
port 443/tcp
|
Per this paper by Daniel Roelker that was presented at Defcon 11, popular Web servers like Microsoft IIS support a variety of encoding schemes for the URLs. These include Percent-escaped Hex Encoding, Double-percent Escaped Hex Encoding, Microsoft's %U Encoding, Percent-escaped 2-Byte UTF-8 Encoding, and Raw 2-Byte UTF-8 Encoding.
For a sample HTTP GET request, GET /. HTTP/1.0, the following illustrates the encoded URI under these schemes:
Percent-escaped Hex Encoding: GET /%2e HTTP/1.0 Double-percent Escaped Hex Encoding: GET /%252e HTTP/1.0 Percent-escaped 2-Byte UTF-8 Encoding: GET /%C0%AE HTTP/1.0 Raw 2-Byte UTF-8 Encoding: GET /\xC0\xAE HTTP/1.0 (Actual raw 0xC0 and 0xAE bytes) Microsoft's %U Encoding: GET /%u002e HTTP/1.0
The supported encoding schemes are listed in the Results section.
URI encoding is relevant to Web server security since, as mentioned in the paper above, attackers could launch HTTP attacks while at the same time obfuscating the URIs to evade detection by Intrusion Detection Systems that are not capable of decoding the URIs.
1
|
DNS Host Name |
IP address | Host name |
XXX.XXX.XXX.XXX | demo01.treutler.de |
1
|
ICMP Replies Received |
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.
ICMP Reply Type | Triggered By | Additional Information |
Echo (type=0 code=0) | Echo Request | Echo Reply |
Timestamp (type=14 code=0) | Timestamp Request | 04:04:52 GMT |
Unreachable (type=3 code=3) | UDP | Port Unreachable |
1
|
Traceroute |
Hops | IP | Round Trip Time | Probe |
1 | 195.154.210.158 | 1.82ms | ICMP |
2 | 212.129.22.5 | 0.44ms | ICMP |
3 | 212.129.8.17 | 1.59ms | ICMP |
4 | 212.129.8.13 | 0.63ms | ICMP |
5 | 213.200.76.193 | 0.63ms | ICMP |
6 | 213.200.81.253 | 77.58ms | ICMP |
7 | 208.173.135.177 | 83.66ms | ICMP |
8 | 204.70.192.214 | 83.55ms | ICMP |
9 | 204.70.192.114 | 162.58ms | ICMP |
10 | 208.172.147.110 | 157.76ms | ICMP |
11 | 216.34.3.83 | 163.16ms | ICMP |
12 | XXX.XXX.XXX.XXX | 157.87ms | UDP |
1
|
Target Network Information |
1
|
Internet Service Provider |
1
|
Host Names Found |
Host Name | Source |
demo01.treutler.de | FQDN |
1
|
Host Scan Time |
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.
1
|
Degree of Randomness of TCP Initial Sequence Numbers |
1
|
Open TCP Services List |
Port | IANA Assigned Ports/Services | Description | Service Detected | OS On Redirected Port |
22 | ssh | SSH Remote Login Protocol | ssh | |
80 | www | World Wide Web HTTP | http | |
111 | sunrpc | SUN Remote Procedure Call | rpc | |
443 | https | http protocol over TLS/SSL | http over ssl |
1
|
Open UDP Services List |
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.
Port | IANA Assigned Ports/Services | Description | Service Detected |
111 | sunrpc | SUN Remote Procedure Call | rpc udp |
1
|
Host Responds to TCP SYN Packet with Other Flags On with SYN ACK |
1
|
IP ID Values Randomness |
1
|
SSH daemon information retrieving |
port 22/tcp
|
SSH1 supported | yes |
Supported authentification methods for SSH1 | RSA, keyboard_interactive, password |
Supported ciphers for SSH1 | 3des, blowfish |
SSH2 supported | yes |
Supported keys exchange algorithm for SSH2 | diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1 |
Supported decryption ciphers for SSH2 | aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael128-cbc, rijndael192-cbc, rijndael256-cbc, rijndael-cbc@lysator.liu.se |
Supported encryption ciphers for SSH2 | aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael128-cbc, rijndael192-cbc, rijndael256-cbc, rijndael-cbc@lysator.liu.se |
Supported decryption mac for SSH2 | hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96 |
Supported encryption mac for SSH2 | hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96 |
Supported authentification methods for SSH2 | publickey, password, keyboard-interactive |
1
|
SSH Banner |
port 22/tcp
|
1
|
SSL Certificate - Information |
port 443/tcp over SSL
|
NAME | VALUE |
(0)CERTIFICATE 0 | |
(0)Version | 3 (0x2) |
(0)Serial Number | 0 (0x0) |
(0)Signature Algorithm | md5WithRSAEncryption |
(0)ISSUER NAME | |
countryName | -- |
stateOrProvinceName | SomeState |
localityName | SomeCity |
organizationName | SomeOrganization |
organizationalUnitName | SomeOrganizationalUnit |
commonName | localhost.localdomain |
emailAddress | root@localhost.localdomain |
(0)SUBJECT NAME | |
countryName | -- |
stateOrProvinceName | SomeState |
localityName | SomeCity |
organizationName | SomeOrganization |
organizationalUnitName | SomeOrganizationalUnit |
commonName | localhost.localdomain |
emailAddress | root@localhost.localdomain |
(0)Valid From | Apr 16 01:19:29 2003 GMT |
(0)Valid Till | Apr 15 01:19:29 2004 GMT |
(0)Public Key Algorithm | rsaEncryption |
(0)RSA Public Key | (1024 bit) |
(0) | Modulus (1024 bit): |
(0) | 00:d4:ea:e8:ee:40:fe:32:2d:f5:b7:1d:e4:de:f7: |
(0) | 0a:2e:30:11:54:21:d3:db:0a:88:2c:10:7c:76:d1: |
(0) | 3d:ba:b1:71:22:06:01:9c:e7:95:0b:96:c6:cb:94: |
(0) | dd:42:c3:9a:bc:21:46:b9:b4:2d:f7:18:a7:39:1b: |
(0) | da:2d:51:50:10:1d:7d:62:93:ab:68:c3:59:fe:27: |
(0) | ae:10:79:8a:9d:ea:8f:36:c9:93:f2:18:b4:e6:2c: |
(0) | f3:cc:5c:c3:16:e6:fd:b5:a2:85:09:6a:27:92:eb: |
(0) | 32:c0:fa:98:9a:b8:dd:2b:0e:c8:d1:78:eb:55:af: |
(0) | 43:19:f1:4b:52:53:8f:1c:0b |
(0) | Exponent: 65537 (0x10001) |
(0)X509v3 EXTENSIONS | |
(0)X509v3 Subject Key Identifier | E2:83:2D:DB:A6:D5:EA:6D:29:97:7D:B6:9A:28:87:A5:EB:40:7F:B3 |
(0)X509v3 Authority Key Identifier | keyid:E2:83:2D:DB:A6:D5:EA:6D:29:97:7D:B6:9A:28:87:A5:EB:40:7F:B3 |
(0) | DirName:/C=--/ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrganizationalUnit/CN=localhost.localdomain/Email=root@localhost.localdomain |
(0) | serial:00 |
(0)X509v3 Basic Constraints | CA:TRUE |
(0)Signature | (128 octets) |
(0) | 05:98:76:3d:b1:09:1a:d7:1d:dc:4d:b1:33:d6:66:4e |
(0) | 8a:de:07:ac:13:5b:bf:93:d3:3e:d1:93:2c:0b:3a:2b |
(0) | 15:ea:aa:2f:0e:79:9c:45:fb:62:d1:6e:b1:6b:8d:f4 |
(0) | 53:8f:8b:ce:15:42:33:09:fe:bf:6b:7e:28:d7:f1:b7 |
(0) | 79:5a:d6:31:a4:59:52:1a:9f:cc:a2:65:fe:86:6e:1d |
(0) | bf:c9:7b:a9:45:46:f1:7f:3e:df:ad:31:db:05:ed:bc |
(0) | 9b:4b:19:ea:92:7f:87:a8:7c:9e:88:fb:b6:e2:f0:3e |
(0) | a4:0d:9a:45:db:5e:a3:ca:cd:31:bf:d4:2b:f5:a5:0c |
1
|
SSL Server Information Retrieval |
port 443/tcp over SSL
|
The following is a list of supported SSL ciphers.
Note: If a cipher is included in this list it means that it was
possible to establish a SSL connection using that cipher. There are some
web servers setups that allow connections to be established using a LOW
grade cipher, only to provide a web page stating that the URL is
accessible only through a non-LOW grade cipher. In this case even though
LOW grade cipher will be listed here QID 38140 will not be reported.
CIPHER | KEY-EXCHANGE | AUTHENTICATION | MAC | ENCRYPTION(KEY-STRENGTH) | GRADE |
SSLv2 PROTOCOL IS ENABLED | |||||
DES-CBC3-MD5 | RSA | RSA | MD5 | 3DES(168) | HIGH |
RC4-MD5 | RSA | RSA | MD5 | RC4(128) | MEDIUM |
RC2-CBC-MD5 | RSA | RSA | MD5 | RC2(128) | MEDIUM |
EXP-RC4-MD5 | RSA(512) | RSA | MD5 | RC4(40) | LOW |
EXP-RC2-CBC-MD5 | RSA(512) | RSA | MD5 | RC2(40) | LOW |
DES-CBC-MD5 | RSA | RSA | MD5 | DES(56) | LOW |
RC4-64-MD5 | RSA | RSA | MD5 | RC4(64) | LOW |
SSLv3 PROTOCOL IS ENABLED | |||||
DES-CBC3-MD5 | RSA | RSA | MD5 | 3DES(168) | HIGH |
RC4-MD5 | RSA | RSA | MD5 | RC4(128) | MEDIUM |
RC2-CBC-MD5 | RSA | RSA | MD5 | RC2(128) | MEDIUM |
EXP-RC4-MD5 | RSA(512) | RSA | MD5 | RC4(40) | LOW |
EXP-RC2-CBC-MD5 | RSA(512) | RSA | MD5 | RC2(40) | LOW |
DES-CBC-MD5 | RSA | RSA | MD5 | DES(56) | LOW |
RC4-64-MD5 | RSA | RSA | MD5 | RC4(64) | LOW |
EXP1024-RC4-SHA | RSA(1024) | RSA | SHA1 | RC4(56) | LOW |
EXP1024-DES-CBC-SHA | RSA(1024) | RSA | SHA1 | DES(56) | LOW |
EXP1024-RC2-CBC-MD5 | RSA(1024) | RSA | MD5 | RC2(56) | LOW |
EXP1024-RC4-MD5 | RSA(1024) | RSA | MD5 | RC4(56) | LOW |
EDH-RSA-DES-CBC3-SHA | DH | RSA | SHA1 | 3DES(168) | HIGH |
EDH-RSA-DES-CBC-SHA | DH | RSA | SHA1 | DES(56) | LOW |
EXP-EDH-RSA-DES-CBC-SHA | DH(512) | RSA | SHA1 | DES(40) | LOW |
DES-CBC3-SHA | RSA | RSA | SHA1 | 3DES(168) | HIGH |
DES-CBC-SHA | RSA | RSA | SHA1 | DES(56) | LOW |
EXP-DES-CBC-SHA | RSA(512) | RSA | SHA1 | DES(40) | LOW |
RC4-SHA | RSA | RSA | SHA1 | RC4(128) | MEDIUM |
TLSv1 PROTOCOL IS ENABLED | |||||
DES-CBC3-MD5 | RSA | RSA | MD5 | 3DES(168) | HIGH |
RC4-MD5 | RSA | RSA | MD5 | RC4(128) | MEDIUM |
RC2-CBC-MD5 | RSA | RSA | MD5 | RC2(128) | MEDIUM |
EXP-RC4-MD5 | RSA(512) | RSA | MD5 | RC4(40) | LOW |
EXP-RC2-CBC-MD5 | RSA(512) | RSA | MD5 | RC2(40) | LOW |
DES-CBC-MD5 | RSA | RSA | MD5 | DES(56) | LOW |
RC4-64-MD5 | RSA | RSA | MD5 | RC4(64) | LOW |
EXP1024-RC4-SHA | RSA(1024) | RSA | SHA1 | RC4(56) | LOW |
EXP1024-DES-CBC-SHA | RSA(1024) | RSA | SHA1 | DES(56) | LOW |
EXP1024-RC2-CBC-MD5 | RSA(1024) | RSA | MD5 | RC2(56) | LOW |
EXP1024-RC4-MD5 | RSA(1024) | RSA | MD5 | RC4(56) | LOW |
EDH-RSA-DES-CBC3-SHA | DH | RSA | SHA1 | 3DES(168) | HIGH |
EDH-RSA-DES-CBC-SHA | DH | RSA | SHA1 | DES(56) | LOW |
EXP-EDH-RSA-DES-CBC-SHA | DH(512) | RSA | SHA1 | DES(40) | LOW |
DES-CBC3-SHA | RSA | RSA | SHA1 | 3DES(168) | HIGH |
DES-CBC-SHA | RSA | RSA | SHA1 | DES(56) | LOW |
EXP-DES-CBC-SHA | RSA(512) | RSA | SHA1 | DES(40) | LOW |
RC4-SHA | RSA | RSA | SHA1 | RC4(128) | MEDIUM |
1
|
SSL Session Caching Information |
port 443/tcp over SSL
|
This test determines if SSL session caching is enabled on the host.
1
|
List of Web Directories |
port 80/tcp
|
Directories |
/cgi-bin/ |
/doc/ |
/usage/ |
/mrtg/ |
/awstats/ |
/manual/ |
1
|
Web Server Version |
port 80/tcp
|
Server Version | Server Banner |
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2 | Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2 |
1
|
HTTP method TRACE and/or TRACK Enabled |
port 80/tcp
|
The exact method(s) used are shown in the Results section.
1
|
List of Web Directories |
port 443/tcp
|
Directories |
/cgi-bin/ |
/doc/ |
/usage/ |
/mrtg/ |
/awstats/ |
/manual/ |
1
|
SSL Web Server Version |
port 443/tcp
|
Server Version | Server Banner |
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2 | Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2 |
1
|
HTTP method TRACE and/or TRACK Enabled |
port 443/tcp
|
The exact method(s) used are shown in the Results section.
XXX.XXX.XXX.XXX (demo02.treutler.de, DEMO02) | Windows 2000 |
|
|
5
|
MS-SQL 8.0 UDP Slammer Worm Buffer Overflow Vulnerability |
port 1434/udp
|
This vulnerability allows for the execution of arbitrary code on the SQL Server computer due to a stack buffer overflow. Once the worm compromises a machine, it will try to propagate itself. The worm will craft packets of 376 bytes and send them to randomly chosen IP addresses on port 1434/udp. If the packet is sent to a vulnerable machine, this machine will become infected and will also begin to propagate. Beyond the scanning activity for new hosts, the current variant of this worm has no other payload.
Activity of this worm is readily identifiable on a network by the presence of 376-byte UDP packets. These packets appear to be originating from seemingly random IP addresses and destined for port 1434/udp.
The high volume of 1434/udp traffic generated by hosts infected with the worm trying to find and compromise other SQL Server computers may itself lead to performance issues (including possible denial-of-service conditions) for Internet-connected hosts or for those computers on networks with compromised hosts.
Note: The patch released with this bulletin is effective in protecting SQL Server 2000 and MSDE 2000 against the "SQL Slammer" worm virus. However, this patch has been superseded by the patch released with MS02-061 which contains fixes for additional security vulnerabilities in these products. Microsoft recommends that SQL 2000 and MSDE 2000 customers apply the patch from MS02-061.
5
|
Windows Plug and Play Remote Code Execution (MS05-039) |
Note that named pipe access to the Plug and Play functions is restricted to authenticated users under Windows XP and 2003. Windows 2000 allows NULL session access to this interface by default, allowing the scanner to detect this vulnerability without login credentials.
Microsoft has categorized this update as Critical.
5
|
Multiple Microsoft Windows Vulnerabilities (MS04-011) |
LSASS Remote Code Execution Vulnerability - CAN-2003-0533 (Windows 2000, XP, 2003 are affected)
LDAP Denial Of Service Vulnerability - CAN-2003-0663 (Windows NT, 2000, XP are affected)
PCT Remote Code Execution Vulnerability - CAN-2003-0719 (Windows NT, 2000, XP, 2003 are affected)
Winlogon Remote Code Execution Vulnerability - CAN-2003-0806 (Windows NT, 2000, XP are affected)
Metafile Remote Code Execution Vulnerability - CAN-2003-0906 (Windows NT, 2000, XP are affected)
Help and Support Center Remote Code Execution Vulnerability - CAN-2003-0907 (Windows XP, 2003 are affected)
Utility Manager Privilege Elevation Vulnerability - CAN-2003-0908 (Windows 2000 is affected)
Windows Management Privilege Elevation Vulnerability - CAN-2003-0909 (Windows XP is affected)
Local Descriptor Table Privilege Elevation Vulnerability - CAN-2003-0910 (Windows NT, 2000 are affected)
H.323 Remote Code Execution Vulnerability - CAN-2004-0117 (Windows 98, 98 SE, ME, 2000, XP, 2003 are affected)
Virtual DOS Machine Privilege Elevation Vulnerability - CAN-2004-0118 (Windows NT, 2000 are affected)
Negotiate SSP Remote Code Execution Vulnerability - CAN-2004-0119 (Windows 2000, XP, 2003 are affected)
SSL Denial Of Service Vulnerability - CAN-2004-0120 (Windows 2000, XP, 2003 are affected)
ASN.1 Double Free Remote Code Execution Vulnerability - CAN-2004-0123 (Windows NT, 2000, XP, 2003 are affected)
5
|
Microsoft Windows ASN.1 Library Integer Handling Vulnerability |
The library MSASN1.dll has been reported to be prone to an integer handling vulnerability. The issue is reported to exist because an integer value that is contained as a part of ASN.1 based communications (certificates) is interpreted as an unsigned integer type. Therefore, potentially malicious values for this integer, for example a signed value of -1(0xffffffff), may trigger unexpected behavior. Because this integer value is trusted, assumed to be unsigned, and conjectured to be further employed in potentially sensitive computations (most likely boundary checking procedures), memory corruption may result.
Note that because ASN.1 data will likely be encoded, for example Kerberos, SSL, IPSec or Base64 encoded, the malicious integer values may be obfuscated and as a result may not be easily detectable.
5
|
Microsoft Windows License Logging Service Could Allow Code Execution (MS05-010) |
A remote buffer overflow vulnerability exists in the License Logging Service that could result in arbitrary code execution or a denial of service. Any user that is able to connect to the ports used by the service (139 and 445) can exploit this vulnerability. Arbitrary code would be executed with System privileges.
On Windows NT 4.0 with any service pack level and Windows 2000 Service Pack 1, 2, and 3, any anonymous user that can connect to the ports could exploit this vulnerability.
On Windows 2000 Service Pack 4 and Windows 2003 only authenticated users can exploit this vulnerability.
This service is installed and running by default on Windows NT 4.0 servers, Windows 2000 servers, and Windows Small Business Server 2000 and 2003. The service is installed but not running by default on Windows Server 2003.
On Windows 2003 servers, the vulnerability can only be exploited to cause a denial of service.
5
|
Microsoft SMB Remote Code Execution Vulnerability (MS05-027) |
Note that Windows NT Workstations and Servers are also vulnerable to this issue. The above security bulletin does not offer a patch for Windows NT systems because, according to Microsoft, they have "reached the end of their life cycles". Please contact Microsoft for additional support periods for Windows NT.
5
|
Microsoft SQL Server Multiple Vulnerabilities |
Local Procedure Calls (LPC) provide a mechanism for interprocess communications on some Microsoft platforms. Each LPC utilizes a collection of communication ports to allow for information exchange between the client and the server. Microsoft SQL Server is prone to a buffer overflow in the mechanism that accepts LPC port requests. If a specifically malformed message is received by the LPC port, stack memory may be overwritten due to insufficient bounds checking.
Microsoft SQL Server and the Microsoft Data Engine have been reported prone to a Named Pipe denial of service attack. Any local or remote user, who can authenticate and is part of the Everyone Group, may trigger a denial of service condition in an affected SQL Server. It has been reported that if a remote attacker sends an unusually large request to a named pipe, the SQL Server will become unresponsive.
Microsoft SQL Server and the Microsoft Data Engine have been reported prone to a privilege escalation vulnerability via named pipes. A named pipe is a conduit for interprocess communication that is identified by a specific name; it is used to pass information between a pipe server and its clients. It has been reported that a named pipe, used to control certain connection attempts to the SQL server, is prone to a vulnerability that may provide escalation of privileges. The issue presents itself within the checking routines for the affected pipe. Under certain circumstances, specifically during the authentication procedure, a local attacker may seize control of the named pipe.
The impact of the denial of service vulnerability may vary between service packs and versions. It has been reported that on SQL Server 2000 without Service Pack 3 installed, the service will crash and must be restarted to restore normal operations. However, on SQL Server 2000 with Service Pack 3 applied, this is not the case. The service does not appear to crash but does not process requests received post-attack. It has also been reported that it's not possible to stop the affected service, and the system will require a reboot to restore normal operations.
If the Named Pipe hijacking vulnerability is successfully exploited, the attacker may thereby inherit the permissions of the user who is attempting to connect to the SQL server via the compromised pipe.
5
|
Microsoft Index Server and Indexing Service ISAPI Extension Buffer Overflow Vulnerability |
port 80/tcp
|
Microsoft Index Server and Indexing Service enables text searches on an Internet or Intranet site via a Web browser. Index Server ships with Windows NT 4.0 Option Pack and Indexing Service ships with Windows 2000.
An unchecked buffer exists in a certain ISAPI extension associated with the Index Server and Indexing Service. A host running Microsoft Index Server or Indexing Service is susceptible to the execution of arbitrary code due to an unchecked buffer in the 'idq.dll' ISAPI extension. If a request is made in a particular manner to a host with 'idq.dll' installed, either Index Server or Indexing Service will experience a buffer overflow and allow the execution of arbitrary code. Unfortunately, the Index Server and Indexing Service runs in the Local System context; therefore, the attacker can specify arbitrary code to be run with Local System privileges.
'idq.dll' provides support for Internet Data Administration (.ida) files and Internet Data Query (.idq) files. In order to exploit this vulnerability, script mappings that associate '.idq' and '.ida' files with 'idq.dll' must exist.
It should be noted that Index Server and Indexing Service do not need to be running in order for an attacker to exploit this issue. 'idq.dll' is installed by default when IIS is installed, subsequently IIS would need to be the only service running.
5
|
Microsoft IIS CGI Filename Decode Error Vulnerability |
port 80/tcp
|
When loading an executable CGI program, Microsoft Internet Information Server (IIS) decodes the CGI filename twice. First, IIS checks the CGI filename to see if it's an executable file. (For example, IIS might do a suffix check-up to see if there's a '.exe' or '.com' extension.) Then, IIS performs a second decode process. This process would typically only apply to the CGI parameters; however, IIS mistakenly decodes both the CGI parameters and the already decoded CGI filename. Thus, the CGI filename is decoded twice.
With a malformed CGI filename, a malicious user can get around the IIS filename security check-ups, such as the '../' or './' check-ups.
In some cases, a malicious user may be able to run arbitrary system commands.
5
|
Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability |
port 80/tcp
|
It was reported that the above Security Bulletin does not contain a valid link for the patch. Alternative links for the patch are: http://www.microsoft.com/ntserver/nts/downloads/critical/q269862 for Microsoft IIS Version 4.0 and http://www.microsoft.com/windows2000/downloads/critical/q269862 for Microsoft IIS Version 5.0.
5
|
Microsoft IIS 4.0/5.0 Extended UNICODE Remote Execution Vulnerability |
port 80/tcp
|
This vulnerability is also used by the sadmind/IIS Worm. For more information about this worm, read CERT Advisory CA-2001-11.
Microsoft IIS Version 4.0: http://www.microsoft.com/ntserver/nts/downloads/critical/q269862
Microsoft IIS Version 5.0: http://www.microsoft.com/windows2000/downloads/critical/q269862
5
|
Microsoft IIS UTF Directory Traversal and Remote Command Execution Vulnerability |
port 80/tcp
|
Microsoft's Internet Information Server (IIS) is vulnerable to a UTF directory traversal, which could allow an attacker to execute commands remotely on the target server.
Normally, IIS blocks attempts to access directories outside of the Web root in HTTP requests. If 'directory traversal' character sequences that try to do this are found in an HTTP request, IIS blocks the request. However, if special UTF encoding is used, this filtering is bypassed, allowing an attacker to traverse outside of the Web root and execute commands on the system.
Remote Web clients may access any known file in the context of the IUSR_machinename account. The IUSR_machinename account is a member of the 'Everyone' and 'Users' groups by default. Therefore, any file on the same logical drive as any Web-accessible file that is accessible to these groups can be deleted, modified, or executed.
It is believed that exploitation of this vulnerability requires the presence of an executable 'scripts'-type virtual folder. Removal of these folders could mitigate this vulnerability. However, Microsoft has not verified that. It is important to note that remote command execution vulnerabilities similar to this were used by the Code Red, Code Blue, and Nimda worms. It should be expected that a worm could exploit this vulnerability to propagate itself. Additional technical details are forthcoming.
Microsoft released patches for IIS Versions 4.0 and 5.0. For more information about this vulnerability, and for information on how to retrieve and apply the patches, refer to Microsoft Security Bulletin MS00-057.
You can get the IIS Version 4.0 patch from the following location:
http://www.microsoft.com/ntserver/nts/downloads/critical/q269862
You can get the IIS Version 5.0 patch from the following location:
http://www.microsoft.com/windows2000/downloads/critical/q269862
5
|
Microsoft Windows ntdll.dll Buffer Overflow Vulnerability |
port 80/tcp
|
The original attack vector exploited in the wild used the WebDAV (World Wide Web Distributed Authoring and Versioning) service provided by IIS 5.0 on Windows 2000. This was possible because WebDAV itself doesn't perform sufficient boundary checks on certain supplied data.
Even if the WebDAV component isn't present, such as on Windows NT/XP (by default), the underlying vulnerability will still remain in the ntdll.dll component if the system is not patched. At present, no attack vectors are known that can exploit this vulnerability on NT and XP platforms. However, applying the patch for these platforms is recommended.
5
|
Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability |
port 80/tcp
|
Microsoft has reported a buffer overflow vulnerability in Windows Media Services. This is due to a problem with how the logging ISAPI extension (nsiislog.dll) handles incoming client requests. The logging facility may attempt to write excessive data to an undersized buffer when handling a malformed HTTP client request. This could trigger a denial of service or remote arbitrary code execution in IIS, which is exploitable through Media Services. The issue would occur in servers that are configured to provide logging of media requests.
5
|
Microsoft SQL Server 2000 SP1 Not Installed |
port 1433/tcp
|
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
5
|
Microsoft SQL Server 2000 SP2 Not Installed |
port 1433/tcp
|
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
5
|
Microsoft SQL Server 2000 Service Pack 3 Not Installed |
port 1433/tcp
|
5
|
Microsoft SQL Server 2000 Service Pack 4 Missing |
port 1433/tcp
|
4
|
Remote Windows User List Disclosure Vulnerability |
For Windows NT, setting this registry value limits only certain interfaces to this data. It is not possible to completely eliminate this vulnerability through a registry setting.
There is another interesting Microsoft document called Local Policies about Windows security policies settings for local policies.
Windows XP onwards Microsoft has added more granular control to the anonymous user access by adding couple of more DWORD registry values in the same key location as RestrictAnonymous, RestrictAnonymousSAM and EveryoneIncludesAnonymous. Set RestrictAnonymous = 1 to restrict share information access, RestrictAnonymousSAM = 1 to prevent enumeration of SAM accounts (User Accounts) and EveryoneIncludesAnonymous = 0 to prevent null-sessions from having any rights.
For Samba servers there is no direct way of disabling null session access. A workaround is may be to specify a non exisiting UNIX account in global section of Samba config file.
guest account = NON EXISTING USER.
If possible, filter out Microsoft networking ports such as TCP ports 135, 137, 138, 139, and UDP ports 135, 137, 138.
Note: Please be aware that changing the restrictanonymous setting to the highest security level for example restrictanonymous = 2 in windows 2000 may disable older programs that make use of this account. It will also affect Windows NT 4.0 Domain Controllers from communicating with each other between trust relationships.
Administrator |
Guest |
IUSR_DEMO02 |
IWAM_DEMO02 |
NetShowServices |
scanner |
TsInternetUser |
4
|
Null Session/Password NetBIOS Access |
Windows NT:
1. Set the following registry key: HKLM\System\CurrentControlSet\Control\Lsa Name: RestrictAnonymous Type: REG_DWORD Value: 1 2. Restart your computer.
Windows 2000:
1. Start "Control Panel-->Administrative Tools-->Local Security Policy". 2. Open "Local Policies-->Security Options". 3. Make sure "Additional restrictions of anonymous connections" is set to "No access without explicit anonymous permissions". 4. Restart your computer.
Windows XP/2003:
1. Start "Control Panel-->Administrative Tools-->Local Security Policy". 2. Open "Local Policies-->Security Options". 3. Make sure the following two policies are enabled: * Network Access: Do not allow anonymous enumeration of SAM accounts * Network Access: Do not allow anonymous enumeration of SAM accounts and shares 4. Disable Network Access: Let Everyone permissions apply to anonymous users. 5. Restart your computer.
Samba:
Make the following settings in smb.conf: * set "security" to "user" * set "domain" to "server" * set "map_to_guest" to "Never"
4
|
Microsoft Windows Task Scheduler Code Execution (MS04-022) |
This update resolves a newly-discovered, privately reported vulnerability. A remote code execution vulnerability exists in the Task Scheduler because of an unchecked buffer. The vulnerability is documented in the vulnerability details section of this bulletin.
If a user is logged on with administrative privileges, a malicious user who successfully exploits this vulnerability could take complete control of an affected system, including installing programs, viewing, changing, or deleting data, or creating new accounts with full privileges.
In most cases, the RPC scheduler runs on ports 1025 to 1050. It may run on higher ports in some cases.
4
|
Windows TCP/IP Remote Code Execution and Denial of Service Vulnerabilities (MS05-019) |
IP Validation Vulnerability:
A remote code execution vulnerability allows an attacker to send a specially crafted IP message to an affected system. An attacker who successfully exploits this vulnerability could cause the affected system to remotely execute code. However, attempts to exploit this vulnerability would most likely result in a denial of service. (CAN-2005-0048)
ICMP Connection Reset Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted Internet Control Message Protocol (ICMP) message to an affected system. An attacker who successfully exploits this vulnerability could cause the affected system to reset existing TCP connections. (CAN-2004-0790)
ICMP Path MTU Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted Internet Control Message Protocol (ICMP) message to an affected system, which could cause network performance to degrade and potentially stop the affected system from responding to requests. (CAN-2004-1060)
TCP Connection Reset Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted TCP message to an affected system. An attacker who successfully exploits this vulnerability could cause the affected system to reset existing TCP connections. (CAN-2004-0230)
Spoofed Connection Request Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted TCP/IP message to an affected system. An attacker who successfully exploited this vulnerability could cause the affected system to stop responding. (CAN-2005-0688)
Note that the above patch does not cover Windows NT 4.0, which the vendor has stopped providing support for. We have confirmed that fully patched Windows NT 4.0 systems are also vulnerable to the issues.
4
|
Microsoft IIS Administrative Pages Cross-Site Scripting Vulnerability |
port 80/tcp
|
This patch also fixes the following issues, which the host is most likely vulnerable to:
CAN-2002-0869: Out of Process Privilege Elevation
CAN-2002-1182: WebDAV Denial of Service
CAN-2002-1180: Script Source Access Vulnerability
It is always a good security practice to restrict access to the IISHelp directory.
4
|
Microsoft IIS Malformed HTR Request Buffer Overflow Vulnerability |
port 80/tcp
|
By sending a series of specially malformed HTR requests, it could be possible for a malicious user to cause the IIS service to fail. Additionally, under a very difficult operational scenario, it could be possible to cause code to run on the server.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
4
|
Microsoft IIS HTR ISAPI Extension Heap Overflow Vulnerability |
port 80/tcp
|
HTR is a scripting technology for IIS that has been largely superseded by ASP (Active Server Pages). A condition exists in the HTR ISAPI extension that may allow a remote attacker to overwrite locations in memory with attacker-supplied data. This condition affects IIS 5.0 and may be effectively mitigated by disabling the extension.
4
|
Microsoft SQL Server Query Method Enables Cached Administrator Connection to be Reused |
port 1433/tcp
|
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
4
|
Microsoft SQL Server 2000 Latest Patch Not Installed |
port 1433/tcp
|
3
|
NetBIOS Shared Folder List Available |
Review the machine to ensure that users have not added any additional unauthorized shares, and that all exposed shares are valid .
If no shares are needed, you can filter all Microsoft networking ports (TCP ports 135, 137, 138, 139, 445 and UDP ports 135, 137, 138) at your firewall and disable null sessions to NetBIOS.
Device Name | Comment | Type |
IPC$ | Remote IPC | 3 |
ADMIN$ | Remote Admin | 0 |
C$ | Default share | 0 |
3
|
Microsoft Windows NT 4.0 / 2000 Ignored SMB Response DoS Vulnerability |
For a more technical description of this vulnerability, refer to the posting on BugTraq at the following link:
http://www.securityfocus.com/archive/1/Pine.SGI.4.05.10006050539051.21894-100000@samba.anu.edu.au
3
|
Microsoft Windows NT 4.0/2000 SMB Write Request Denial of Service Vulnerability |
3
|
Administrator Account's Password Does Not Expire |
Note that the Administrator account on the Domain Controller(s) will always have a password that does not expire, since the option check box in the properties dialog box for this account is greyed out.
3
|
Service Pack 4 Not Installed on Windows 2000 |
We reported this vulnerability because at least one of the following is true:
(1) We detected "IIS Redirection Response Contains Garbage Characters with Long URL" (Treutler ID 11330), which is fixed in Service Pack 4.
(2) We detected vulnerabilities fixed by the patch offered in Microsoft Security Bulletin MS02-018.
(3) We obtained the exact OS service pack information which shows that Service Pack 4 is not installed.
3
|
Built-in Guest Account Not Renamed at Windows Target System |
3
|
Microsoft Windows 2000 SMTP Improper Authentication Vulnerability |
port 25/tcp
|
3
|
Microsoft SMTP Service Malformed Command Denial of Service Vulnerability |
port 25/tcp
|
This vulnerability is known to affect the following systems:
The vulnerability is not present on any systems using Exchange 5.5.
3
|
Mail Server Accepts Plaintext Credentials |
port 25/tcp
|
Your server accepts PLAIN or LOGIN as one of the AUTH parameters. The authentication credentials are transmitted in plaintext over the network and no encryption is performed.
Please contact your vendor for configuration information. Also check RFC 2554 and RFC 2487 for more details.
3
|
Microsoft IIS Indexed Directory Disclosure Vulnerability |
port 80/tcp
|
Unauthorized remote users can view the entire root directory structure and all sub-directories due to a flaw in Web Distributed Authoring and Versioning (WebDAV) search implementation. Hidden directories, including files (*.inc), or other documents that would not normally be accessible through the regular Web site interface can be viewed. Sensitive files containing information, such as usernames and passwords, may be accessible.
Microsoft recommends the following two resolutions:
1. If you are not using Index Server (for example, you don't have content on your Web site that you want to have searched), disable or uninstall the service.
2. In directories that contain sensitive information, be sure to disable the "Index this Resource" option on the appropriate tab (for example, a virtual directory on the Virtual Directory tab).
3
|
Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability |
port 80/tcp
|
A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
Some IIS users have complained that the path MS02-018 failed to fix the cross-site scripting vulnerability in the error pages. To work around this, you may create or modify custom error pages to remove the vulnerable part:
1. Open the IIS Manager console.
2. Access the properties for your website.
3. Access 'Custom Errors' tab.
4. Modify error pages, replace or remove the line containing "document.write", "urlresult" and "displayresult".
3
|
Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability |
port 80/tcp
|
A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
3
|
Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability |
port 80/tcp
|
If a particular ISAPI filter, which is installed with Front Page Server Extensions and ASP.NET, receives a URL that exceeds the maximum allowable length, the IIS service will fail. The ISAPI filter fails the request and sets the URL to a null value. When IIS receives the null value, it still attempts to process the request before returning an error message. This results in an access violation error, which causes the IIS service to fail.
So far, Microsoft has only identified this issue in one ISAPI filter. However, there is a possibility that other ISAPI filters could contain the same behavior. The vulnerability is not within the ISAPI filter itself, but with the way that IIS handles the null value returned by the filter.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
3
|
Microsoft IIS Help File Search Cross Site Scripting Vulnerability |
port 80/tcp
|
A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has apparently been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
3
|
Microsoft SQL Server Patch Not Installed (MS00-092) |
port 1433/tcp
|
SQL Server provides an API called srv_paraminfo() for parsing input parameters for XPs. This API has a flaw that could result in a buffer overrun condition.
The API is designed to locate the nth parameter in a string, and put it into a buffer provided by the XP. By design, the API does not provide a way for the XP to indicate the length of the buffer. Instead, the XP is expected to ensure that the buffer will be large enough to hold the parameter. However, not all XPs provided by default in SQL Server perform this checking.
Any malicious user who provides a sufficiently-long parameter to an affected XP could cause a buffer overrun within srv_paraminfo(). The malicious user may do this in order to cause the SQL Server to fail or to execute malicious code.
The malicious user might try to attack an SQL Server directly by logging onto it and calling an XP. This is only possible if the user is able to successfully authenticate to the SQL Server.
The malicious user might try to attack a database server serving as a back-end to a Web server by providing carefully chosen inputs to the Web application.
However, XPs are rarely used by Web applications. Even if a Web application uses an XP, the malicious user would need detailed knowledge of the application design in order to feed it parameters that would pass to the XP and subsequently to srv_paraminfo() in such a way as to exploit the unchecked buffer.
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
3
|
Microsoft SQL Server Cumulative Patch Not Installed (MS02-034) |
port 1433/tcp
|
A buffer overrun vulnerability in a procedure used to encrypt SQL Server credential information. An attacker who was able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself depending on the account that the SQL Server runs as.
A buffer overrun vulnerability in a procedure that relates to the bulk inserting of data in SQL Server tables. An attacker who is able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself.
A privilege elevation vulnerability that results because of incorrect permissions on the Registry key that stores the SQL Server service account information. An attacker who is able to successfully exploit this vulnerability could gain greater privileges on the system than had been granted by the system administrator - potentially even the same rights as the operating system.
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
3
|
Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability |
port 8521/tcp
|
A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
Some IIS users have complained that the path MS02-018 failed to fix the cross-site scripting vulnerability in the error pages. To work around this, you may create or modify custom error pages to remove the vulnerable part:
1. Open the IIS Manager console.
2. Access the properties for your website.
3. Access 'Custom Errors' tab.
4. Modify error pages, replace or remove the line containing "document.write", "urlresult" and "displayresult".
3
|
Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability |
port 8521/tcp
|
If a particular ISAPI filter, which is installed with Front Page Server Extensions and ASP.NET, receives a URL that exceeds the maximum allowable length, the IIS service will fail. The ISAPI filter fails the request and sets the URL to a null value. When IIS receives the null value, it still attempts to process the request before returning an error message. This results in an access violation error, which causes the IIS service to fail.
So far, Microsoft has only identified this issue in one ISAPI filter. However, there is a possibility that other ISAPI filters could contain the same behavior. The vulnerability is not within the ISAPI filter itself, but with the way that IIS handles the null value returned by the filter.
There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.
2
|
Non-Zero Padding Bytes Observed in ICMP Protocol Unreachable Packets |
2
|
TCP Sequence Number Approximation Based Denial of Service |
The cause of the vulnerability is that affected implementations will accept TCP sequence numbers within a certain range, known as the acknowledgement range, of the expected sequence number for a packet in the session. This is determined by the TCP window size, which is negotiated during the three-way handshake for the session. Larger TCP window sizes may be set to allow for more throughput, but the larger the TCP window size, the more probable it is to guess a TCP sequence number that falls within an acceptable range. It was initially thought that guessing an acceptable sequence number was relatively difficult for most implementations given random distribution, making this type of attack impractical. However, some implementations may make it easier to successfully approximate an acceptable TCP sequence number, making these attacks possible with a number of protocols and implementations.
This is further compounded by the fact that some implementations may support the use of the TCP Window Scale Option, as described in RFC 1323, to extend the TCP window size to a maximum value of 1 billion.
This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.
There are a few factors that may present viable target implementations, such as those which depend on long-lived TCP connections, those that have known or easily guessed IP address endpoints and those implementations with easily guessed TCP source ports. It has been noted that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack, due to the use of long-lived TCP sessions and the possibility that some implementations may use the TCP Window Scale Option. As a result, this issue is likely to affect a number of routing platforms.
Another factor to consider is the relative difficulty of injecting packets into TCP sessions, as a number of receiving implementations will reassemble packets in order, dropping any duplicates. This may make some implementations more resistant to attacks than others.
It should be noted that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further.
Various implementations and products including Check Point, Cisco, Cray Inc, Hitachi, Internet Initiative Japan, Inc (IIJ), Juniper Networks, NEC, Polycom, and Yamaha are currently undergoing review. Contact the vendors to obtain more information about affected products and fixes. NISCC Advisory 236929 - Vulnerability Issues in TCP details the vendor patch status as of the time of the advisory, and identifies resolutions and workarounds.
The Internet Engineering Task Force (IETF) has developed an Internet-Draft titled Transmission Control Protocol Security Considerations that addresses this issue.
Workaround:
The following BGP-specific workaround information has been provided.
For BGP implementations that support it, the TCP MD5 Signature Option should be enabled. Passwords that the MD5 checksum is applied to should be set to strong values and changed on a regular basis.
Secure BGP configuration instructions have been provided for Cisco and Juniper at these locations:
http://www.cymru.com/Documents/secure-bgp-template.html
http://www.qorbit.net/documents/junos-bgp-template.pdf
2
|
ICMP Based TCP Reset Vulnerability |
A workaround is to block ICMP hard-error packets using a firewall.
2
|
NetBIOS Name Accessible |
2
|
Disabled SMB Signing |
Under Windows NT4/2000/2003 Server:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters
Under Windows NT4 Client:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Rdr\Parameters
Under Windows XP/2000 Client:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManWorkstation\Parameters
For more information about enabling SMB signing on Windows 98 platforms, read Microsoft Microsoft Knowledge Base Article - 230545, which can be found on Microsoft's Support Web site.
For a Samba server, the server global configuration "server signing = mandatory" (in the smb.conf file) requires clients to use SMB signing offered by the server.
If you decide to enable SMB signing, be sure to enable it on all the clients on your network, or you will encounter problems connecting from clients not using SMB signing.
2
|
Default Windows Administrator Account Name Present |
Please note that if the scanner has been configured to use Windows Authentication and uses the local administrator account (as against a domain-admin account) to scan this target, the scanner will need to be reconfigured to use the new administrator account name instead.
2
|
Microsoft SMTP Fails To Understand Pipelined Commands in DATA |
port 25/tcp
|
The following link offers more information about this vulnerability: http://support.microsoft.com/default.aspx?kbid=813050.
It has been reported that this issue still exists on some Windows 2000 systems after Service Pack 4 is installed.
2
|
Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability |
port 80/tcp
|
A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.
The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.
Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.
The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.
Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule .* - [F] </IfModule>With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.
A slightly tighter fix is to use:
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$ RewriteRule .* - [F] </IfModule>
Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.
URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.
Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.
For more details about other web servers : Cert Advisory.
2
|
WebDAV HTTP Method 'PROPFIND' Enabled |
port 80/tcp
|
For IIS 6.0, please refer the document on configuring dynamic content.
2
|
Account Brute Force Possible Through IIS NTLM Authentication Scheme |
port 80/tcp
|
If the host does not have an account lockout policy in place, a remote user may exploit this vulnerability to brute force user passwords.
Note that the Windows user list may sometimes be obtained by exploiting other vulnerabilities. Windows also has a few easy-to-guess default names for built-in accounts: "Administrator" for administering the computer/domain, "Guest" for guest access, "IUSR_<MachineName>" for anonymous access to IIS, and "IWAM_<Machinename>" for IIS to start out of process applications. Here the machine name <Machinename> may be obtained via Windows UDP Netbios NS (port 137).
Among the above built-in accounts, the account lockout policy, even if it is in place, does not apply to the administrator account. So if the host uses a default name of "Administrator" for the administrator account, the password brute force of this account is possible through the "Printers" authentication interface.
In addition, if the request has the NTLMSSP_REQUEST_TARGET flag on, the Web server may respond to the request with an NTLM challenge that contains sensitive host information, such as the Windows server and domain in which the authentication will be checked.
As a workaround, disable NTLM authentication for your Web server. This can be done by unchecking "Integrated Windows Authentication" within "Authentication Method" under "Directory Security" in "Default Web Site Properties".
2
|
Microsoft SQL Server Text Format Functions Contain Unchecked Buffer |
port 1433/tcp
|
The first vulnerability results because of a flaw in the functions themselves. Several of the functions do not adequately verify that the requested text will fit into the buffer that is supplied to hold the text. A buffer overrun could occur as a result, and could be used either to run code in the security context of the SQL Server service or to cause the SQL Server service to fail. SQL Server can be configured to run in various security contexts, and by default runs as a domain user. The precise privileges an attacker could gain depends on the specific security context that the service runs in.
The second vulnerability results because of a format string vulnerability in the C runtime functions that the SQL Server functions call when installed on Windows 2000 or Windows XP. Although format string vulnerabilities often can be exploited to run code of the attacker's choice, that is not true in this case. Because of the specific way this vulnerability occurs, the C runtime code would always be overrun with the same values regardless of the attacker's inputs. As a result, this vulnerability could only be used as a denial of service.
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
2
|
Microsoft SQL Server 2000 Cumulative Patch Not Installed (MS02-043) |
port 1433/tcp
|
It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.
1
|
ICMP Timestamp Request |
However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) are necessary for proper behavior of Operating System TCP/IP stacks.
It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.
1
|
Microsoft IIS Authentication Method Disclosure Vulnerability |
port 80/tcp
|
When a valid authentication request is submitted (for either method) with an invalid username and password, an error message is returned. This happens even if anonymous access to the requested resource is allowed.
5
|
Microsoft SMB Request Handler Buffer Overflow Vulnerability |
Microsoft SMB request handler has been reported prone to a buffer overflow vulnerability. It's possible to craft a malicious SMB request packet containing parameters that will trigger the assignment of an insufficient buffer in memory. A remote authenticated attacker may create an insufficient bounds checking condition in the affected handler. In this way, an attacker may corrupt memory adjacent to the affected buffer with excessive attacker-supplied data.
Note that the attacker must be authenticated by the target SMB server to successfully exploit this vulnerability.
5
|
Microsoft ISAPI Extension for Windows Media Services Buffer Overflow Vulnerability |
port 80/tcp
|
This capability is implemented as an Internet Services Application Programming Interface (ISAPI) extension nsiislog.dll. When Windows Media Services are installed in Windows NT 4.0 Server or added through add/remove programs to Windows 2000, nsiislog.dll is installed to the Internet Information Services (IIS) Scripts directory on the server.
There is a flaw in the way in which nsiislog.dll processes incoming requests. A vulnerability exists because an attacker may send specially formed communications to the server. This may cause IIS to stop responding to Internet requests or execute attacker's code on the host.
5
|
Microsoft IIS 5.0 In-Process Table Privilege Elevation Vulnerability |
port 80/tcp
|
When executables run 'in-process', they run as part of the main IIS process. It's important to restrict which executables can run 'in-process' because as part of the main IIS process, they execute in the Local System security context.
IIS Version 5.0 ships with a table of executables that will run 'in-process' when requested remotely by a Web client. Even though all of these binaries are shipped with IIS, they are listed in the table using relative paths. A user who can create files on an IIS server can place an executable on the Web root filesystem with a relative path and filename that matches an entry in the table. When the executable is requested, the path and filename match causes it to be executed 'in-process'. The executable may provide administrative access to the unprivileged user.
By default, unprivileged users do not have permission to upload content to an IIS server.
This bug may also be exploited remotely in the unlikely event that a remote user has managed to get write access to the Web site. Note, however, that such a remote user would already (and without this bug) be able to change the Web site content, leading to a possible defacement of the site, or be able to place custom CGI scripts on the site, leading to arbitrary code execution on the server.
Note: As with any local security hole, TreutlerGuard cannot perform active testing to determine whether or not your machine is vulnerable. Therefore, if you have already applied the appropriate patch, you can safely ignore this warning.
5
|
Microsoft IIS 5.0 In-Process Table Privilege Elevation Vulnerability |
port 8521/tcp
|
When executables run 'in-process', they run as part of the main IIS process. It's important to restrict which executables can run 'in-process' because as part of the main IIS process, they execute in the Local System security context.
IIS Version 5.0 ships with a table of executables that will run 'in-process' when requested remotely by a Web client. Even though all of these binaries are shipped with IIS, they are listed in the table using relative paths. A user who can create files on an IIS server can place an executable on the Web root filesystem with a relative path and filename that matches an entry in the table. When the executable is requested, the path and filename match causes it to be executed 'in-process'. The executable may provide administrative access to the unprivileged user.
By default, unprivileged users do not have permission to upload content to an IIS server.
This bug may also be exploited remotely in the unlikely event that a remote user has managed to get write access to the Web site. Note, however, that such a remote user would already (and without this bug) be able to change the Web site content, leading to a possible defacement of the site, or be able to place custom CGI scripts on the site, leading to arbitrary code execution on the server.
Note: As with any local security hole, TreutlerGuard cannot perform active testing to determine whether or not your machine is vulnerable. Therefore, if you have already applied the appropriate patch, you can safely ignore this warning.
4
|
Microsoft Network Share Provider SMB Request Buffer Overflow Vulnerability |
To exploit this vulnerability, a remote malicious able to connect to a vulnerable system could send a specially constructed SMB request packet. It may be possible to corrupt sensitive process memory to cause the underlying system to crash. If this occurs, then a reboot is required in order to regain normal functionality.
This vulnerability may be exploited both as an authenticated user, and with anonymous access to the service.
4
|
Microsoft Windows SMTP Service Authorization Bypass Vulnerability |
port 25/tcp
|
A flaw exists in the way that the Windows 2000 SMTP service and Microsoft Exchange Server 5.5 interact with the NTLM authentication layer. Due to a failure of these services to perform adequate checks, it may be possible for a user who has authenticated via the NTLM authentication layer to gain unauthorized access to the SMTP service itself with the privileges of a non-administrative user.
The expected behavior is that users can only access the SMTP service if privileges were explicitly given to them.
If you are running Microsoft Windows 2000 Advanced Server 0.0SP2, Microsoft Windows 2000 Server 0.0SP2, or Microsoft Windows 2000 Professional 0.0SP2, then apply the following patch:
Microsoft Patch Q313450_W2K_SP3_X86_EN.exe
If you are running Microsoft Exchange Server 5.5 Service Pack 4, then apply the following patch:
Microsoft Patch Q289258engi386.EXE
4
|
Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability |
port 80/tcp
|
4
|
Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability |
port 80/tcp
|
Specifically, when the WebDAV "PROPFIND" and "SEARCH" methods receive a request containing more than 49,153 bytes, the IIS service will fail. This occurs because the unusually long request causes the error handling for XML requests to occur out of sequence.
This patch also addresses these vulnerabilities:
- Redirection Cross Site Scripting (CAN-2003-0223)
- Server Side Include Web Pages Buffer Overrun (CAN-2003-0224)
- ASP Headers Denial of Service (CAN-2003-0225)
Important note: Apply the patch for MS03-018 after applying the patch for Microsoft Security Bulletin MS02-050. If you do not apply the patch for MS02-050 first, the patch for MS03-018 will cause client-side certificates to be rejected.
Workaround:
1. Completely disable WebDAV by setting the value of the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW3SVCParametersDisableWebDAV registry key to 1.
2. Limit the length of requests (the url and any headers) by setting the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesw3svcparameters MaxClientRequestBuffer to something like 16k.
3. Block the following WebDAV HTTP verbs using URLScan (either by specifically blocking them or by not listing them as allowed): OPTIONS, PROPFIND, PROPPATCH, MKCOL, DELETE, PUT, COPY, MOVE, LOCK, UNLOCK, OPTIONS, and SEARCH. Note that FrontPage does require the OPTIONS method to work properly.
4. Block the following WebDAV-related headers using the [DenyHeaders] section of URLScan.ini:
[DenyHeaders]
DAV:
Depth:
Destination:
If:
Label:
Lock-Token:
Overwrite:
TimeOut:
TimeType:
DAVTimeOutVal:
Other:
Translate:
5. If you require WebDAV, you can limit the length of each individual header with these entries in the [RequestLimits] section (the exact values are obviously pretty generic and may need to be increased or decreased based on your particular configuration):
[RequestLimits]
Max-DAV=250
Max-Depth=250
Max-Destination=250
Max-If=250
Max-Label=250
Max-Lock-Token=250
Max-Overwrite=250
Max-TimeOut=250
Max-TimeType=250
Max-DAVTimeOutVal=250
Max-Other=250
Max-Translate=250
4
|
Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability |
port 80/tcp
|
This condition is due to an unchecked buffer, which is dynamically allocated by the ISAPI extension that implements HTR. HTR scripting has largely been abandoned in favor of ASP (Active Server Pages). This vulnerability is only a problem on systems that have the HTR ISAPI filter enabled.
This vulnerability affects IIS 4.0 and IIS 5.0. Exploitation of this vulnerability may result in a denial of service or allow for a remote attacker to execute arbitrary instructions on the victim host. An attacker can possibly initiate a malicious session capable of overwriting static global variables, stored function pointers, process management structures, memory management structures, and other data types with attacker-supplied instructions.
On IIS 4.0, arbitrary code execution may result in a full compromise. On IIS 5.0, this issue may allow an attacker to gain fewer yet still significant privileges.
This vulnerability is similar to the issue described in Bugtraq ID 4485 and Microsoft Security Bulletin MS02-018. The difference is that this issue specifically affects the HTR ISAPI extension.
4
|
Multiple MS-SQL-2000 (MS-SQL-8 ) threats - (I) |
The following threats are present in Microsoft SQL Server 8 (MS-SQL-8):
1) Microsoft SQL Server/Data Engine various xp_ Buffer Overflow Vulnerabilities. The API Srv_paraminfo() function is implemented by Extended Stored Procedures (XPs). XPs are DLL files that perform high-level functions. When called, they invoke a function called Srv_paraminfo(), which parses the input parameters. Srv_paraminfo() does not check the length of the parameter string that an XP passes to it. The following XPs are affected: xp_displayparamstmt, xp_enumresultset, xp_showcolv, xp_updatecolvbm, xp_peekqueue, xp_printstatements, xp_proxiedmetadata and xp_SetSQLSecurity.
2) Microsoft SQL Server Multiple Overflow and Format String Vulnerabilities. SQL Server provides built-in functions for the formatting of error messages based on C-style format specifiers. These built-in functions are accessible to all users. Providing specially-crafted input to these functions results in exploitable error conditions in the SQL Server process. To mount this attack, the malicious user must have permission to execute SQL queries either directly or by leveraging SQL Command Injection flaws.
3) Microsoft SQL Server Provider Name Buffer Overflow Vulnerability . SQL Server does not perform proper bounds checking of the provider arguments to the OpenDataSource and OpenRowset functions. These functions may be used by an ordinary user to reference OLE DB data sources. As a result, it's possible to cause a buffer overflow condition to occur by providing an excessively long string as a provider name in a query.
4) Microsoft SQL Server xp_dirtree Buffer Overflow Vulnerability . A vulnerability has been reported in the xp_dirtree function. If an extremely large parameter is passed to the stored procedure xp_dirtree, a buffer overflow condition will occur. This issue may be related to an older known problem with unsafe usage of the Srv_paraminfo() function call. This issue is discussed in BIDs 2030, 2031, 2038, 2039, 2040, 2041, 2042, and 2043. This relationship has not been confirmed.
5) Microsoft SQL Server Administrator Cached Connection Vulnerability. Query methods are SQL Server commands used to request information from the database. A flaw exists in the handling of specially-structured ad hoc queries, which could enable a normal user to gain administrative privileges. In order to gain access to information in the database, a user must make a connection to the server. Once access to the database is no longer required, the user logging off will terminate the connection. However, by design SQL Server will store the connection used by the user in cache for a certain amount of time. This is done to improve the server's performance. Next time that particular user logs in, SQL Server can reinstate the cached connection rather than creating a new one.
6) Microsoft SQL Server SQLXML Script Injection Vulnerability. SQLXML is a component that enables SQL servers to receive and send database queries via XML format. Such queries can be sent using various methods of communication, one of which is via HTTP. SQLXML HTTP components reside in a virtual directory on a Web server and are not enabled by default. It is possible to include script code in an XML database request via the Root parameter, and as a result SQLXML would include the attacker's script in the response. When the response is rendered by a Web browser, the attacker's script will execute.
2) By exploiting this vulnerability, it may be possible for malicious users to execute arbitrary code on a host running a vulnerable version of Microsoft's SQL Server.
3) Successful exploitation of this vulnerability could allow a malicious user to execute arbitrary code with the privileges of the database. There is a possibility that this issue may be exploited remotely, either via distributed SQL queries or potentially via an SQL injection attack.
4) If an extremely large parameter is passed to a vulnerable stored procedure, a buffer overflow condition will occur. Depending on the data supplied, this could cause a denial of service condition, or result in the execution of arbitrary code as the SQL Server process.
5) By exploiting this vulnerability, logged-in users can gain administrative privileges to the database.
6) It's possible, under some circumstances, to inject arbitrary script code via XML tags. This may allow an attacker to execute script code in the context of the Internet Explorer Security Zone associated with the IIS server running the vulnerable components. This may result in a malicious script running with a higher privilege, such as in the context of the Intranet Zone.
2) Microsoft released the following fix for SQL Server 2000 SP2: Microsoft Patch Q316333.
3) Microsoft released the following fix for SQL Server 2000 SP2: Microsoft Patch Q316333.
4) Microsoft released the following fix for SQL Server 2000 SP1, and SQL Server 2000: Microsoft Patch Q299717.
5) Microsoft released patches to fix this issue. Download a patch from the Microsoft SQL Web site.
If you are using Veritas' BackUp Exec, follow these recommandations.
We recommend upgrading to the latest SQL Server Service Pack which is SP4. Please refer the Microsoft SQL Server Product Page for more details and instructions on downloading and installing the latest Service Pack.
4
|
Multiple MS-SQL-2000 (MS-SQL-8 ) threats - (II) |
The following threats are present in MS-SQL-8:
1) Microsoft SQL Server SQLXML Buffer Overflow Vulnerability. SQLXML is a component that enables SQL servers to receive and send database queries via XML format. Such queries can be sent using various methods of communication, one of which is via HTTP. SQLXML HTTP components reside in a virtual directory on a Web server and are not enabled by default. SQLXML ISAPI extensions run with LocalSystem privileges. It is possible for a user to initiate the overflow by connecting to a host via HTTP and submitting malformed data directly to the SQLXML HTTP component.
2) Microsoft SQL Server 2000 PWDEncrypt Buffer Overflow Vulnerability. This vulnerability is due to insufficient bounds checking of data supplied to the built-in pwdencrypt() hashing function. The attacker must be able to execute a database query using the pwdencrypt() function to exploit this vulnerability, which implies that the attacker must either have legitimate access to the database server or obtain unauthorized access through some other means. For example, it may be possible to exploit this issue via an SQL injection attack in another application.
3) Multiple Microsoft SQLServer 2000 Vulnerabilities. The first buffer overrun condition exists in the procedure used to encrypt SQL Server credential information. If a parameter passed to the procedure from within a query is of excessive length, the overrun occurs.
The second buffer overrun condition is related to the "bulk-input" feature. This feature allows administrators to import data into a database table or view directly from data files with a custom format. Attackers may exploit this vulnerability by invoking a bulk input procedure with maliciously constructed arguments.
By default, the permissions of the registry key used to specify the account used by the SQL server process are insecure. Through SQL queries, the key may be modified without administrative privileges.
4) Microsoft SQL Server Installation Password Caching Vulnerability. During the initial installation of SQL Server 2000, or the installation of service packs, information is gathered and stored in a special file, setup.iss, which may contain passwords supplied during the installation process. The log file documenting the installation process will also contain passwords entered. The passwords are first encrypted and then stored. A Microsoft released bulletin notes that the encryption may be weak. During the installation process, passwords may be stored in either of the following two cases:
5) Microsoft SQL Server 2000 Database Consistency Checkers Buffer Overflow Vulnerability. SQL Server and Microsoft Desktop Engine ship with Database Consistency Checkers (DBCCs). Several of the DBCCs contain identical buffer overflow vulnerabilities in areas of the code that handle user input. Most DBCCs can only be executed by database administrator users, however, users who have been assigned either the 'db_owners' or 'db_ddladmin' fixed server roles can also execute one or more of these DBCCs.
2) This vulnerability may be exploited to execute arbitrary instructions as the SQL Server.
3) Two of the vulnerabilities are buffer overrun conditions that may result in the execution of code supplied by remote attackers. The buffer overrun condition related to the "bulk-input" feature is mitigated by the default access restrictions on the bulk input procedure. Only members of the "Bulk Administrators" group may run the vulnerable procedure. The final vulnerability is due to a weak default configuration that could allow attackers to change the user account of the SQL Server process. If the server has been configured to run with non-administrative privileges, an attacker may exploit this vulnerability to configure the server so that it runs with higher privileges when it is next started.
4) If exploited by a malicious user, passwords stored in setup.iss, which are supplied during the installation process, may be stolen.
5) Successfully exploiting this vulnerability could lead to arbitrary code execution with the privilege level of the SQL Server service account.
2) Read Microsoft Security Bulletin MS02-034 for more information about these vulnerabilities and for instructions for obtaining a patch.
3) Microsoft has stated that SQL Server 7.0 is not affected by any of the reported vulnerabilities. Microsoft has released a patch for SQL Server 2000 SP2. It will be included in SP3. Check Microsoft's Download site for updates.
4) Microsoft has provided a utility, killpwd.exe, which will remove the passwords from any accessible directories. Check Microsoft's Download site for updates.
5) Microsoft has released a patch to address this vulnerability. Check Microsoft's Download site for updates.
We recommend upgrading to the latest SQL Server Service Pack which is SP4. Please refer the Microsoft SQL Server Product Page for more details and instructions on downloading and installing the latest Service Pack.
4
|
Multiple MS-SQL-2000 (MS-SQL-8 ) threats - (III) |
The following threats are present in MS-SQL-8:
1) Microsoft SQL Server 2000 Replication Stored Procedures Injection Vulnerability. It's possible to inject operating system commands into the SQL Server database due to a vulnerability in two stored procedures used during replication. These stored procedures do not validate input passed to them, thus allowing a user to inject custom SQL and potentially operating system commands.
2) Microsoft SQL Server 2000 Resolution Service Denial of Service Vulnerability. SQL Server 2000 uses a keep-alive mechanism that operates through the Resolution Service. If the keep-alive function receives a specially-crafted data packet, it will reply with an identical packet. Therefore, if one SQL Server sends a data packet that was specially crafted to another SQL Server's keep-alive function, the second SQL Server would respond with an identical packet, causing the two servers to enter an endless loop.
3) Microsoft SQL Server 2000 Resolution Service Stack Overflow and Heap Overflow Vulnerability. A stack-based and heap-based overflow in the resolution service could be exploited by a malicious user by sending specially-crafted UDP packets to port 1434. If the packet consists of data not specifically designed to cause code execution, a denial of service may result.
4) Microsoft SQL Server Remote Buffer Overflow Vulnerability. This vulnerability allegedly occurs even before authentication can proceed. Reportedly, this is due to a default system configuration. Microsoft SQL Server listens for connections on TCP port 1433. An attacker can exploit this vulnerability by sending specially crafted packets to TCP port 1433 which causes SQL Server to crash and possibly execute attacker supplied code.
5) Microsoft SQL MS Jet Engine Unicode Buffer Overflow Vulnerability. This condition occurs when the OpenDataSource function is used with MS Jet Engine. The OpenDataSource function is used for referencing heterogeneous OLE DB data sources in Transact-SQL statements. Microsoft Jet Engine is the database engine for Microsoft SQL Server. This condition may be triggered if an overly long string is passed to the Microsoft Jet Engine component via the OpenDataSource function.
6) Microsoft SQL Agent Jobs Privilege Elevation Vulnerability. SQL Server 2000 uses an Agent, which is responsible for restarting the SQL Server service, replication, and running scheduled jobs. Some of the jobs supplied by Microsoft as stored procedures on the SQL Server contain weak permissions. The following procedures are affected: sp_add_job, sp_add_jobstep, sp_add_jobserver, and sp_start_job.
The Agent typically runs in the security context of the SQL Server Service Account. Under normal circumstances, when a T-SQL job is submitted to the Agent, it will drop its privilege level by performing the following command: SETUSER N'guest' WITH NORESET. This can be bypassed by causing the Agent to reconnect after it has performed the privilege lowering command.
7) Microsoft SQL Server Extended Stored Procedure Privilege Elevation Vulnerability. Some of the extended stored procedures contain weak permissions. The extended stored procedures typically connect to the database in the security context of the SQL Server Service Account. A user with low privileges could pass certain arguments to the vulnerable extended stored procedures, allowing them to perform actions on the database in the security context of the SQL Server Service Account.
2) When this vulnerability is exploited, both servers will eventually consume all available resources, resulting in a denial of service condition. It is important to note that an SQL Server will never send the particular packet needed to exploit this vulnerability to another SQL Server under normal operating conditions. An attacker would have to send one SQL Server the packet with a spoofed source address belonging to a second SQL Server.
3) It may be possible to craft the exploit code to execute arbitrary instructions in the security context of the SQL server. This may provide a remote malicious user with local access to the underlying host.
4) The nature of these issues suggests that memory corruption may be occurring. If that is the case, it is possible that these issues may be remotely exploitable to execute arbitrary code as a system process, possibly leading to local access to the vulnerable system.
5) This issue may be exploited to execute attacker-supplied instructions with the privileges of the SQL Server process. If the SQL Server process is running in the SYSTEM context, this may lead to a full compromise. This issue requires that the attacker is capable of passing maliciously crafted data to the OpenDataSource function. Under normal circumstances, this would require the attacker to have access to the database server. However, this may be exploitable remotely via SQL injection vulnerabilities in any Web-based software that accesses a vulnerable database. Due to this being an issue in the MS Jet Engine component itself, other products that rely on Jet Engine may also be affected by this vulnerability.
6) A malicious user can achieve this using the extended stored procedures discussed in the Microsoft SQL Server Extended Stored Procedure Privilege Elevation Vulnerability. By exploiting this vulnerability, a malicious user would be able to execute other extended stored procedures, such as xp_cmdshell, on the SQL Server with the security context of the SQL Server Service Account.
7) The vulnerability could also be exploited by an attacker visiting a Web site that uses one of these extended stored procedures as part of a search engine for the database. The database-driven Web application would need to be prone to existing input validation vulnerabilities for this type of exploitation to occur. If this vulnerability is exploited, a user with low privileges may perform actions on the database in the security context of the SQL Server Service Account.
4) No solution is available at this time. Check for upgrades at Microsoft's Download site.
5) Microsoft advises affected users to obtain the latest version of Microsoft Jet Engine from Microsoft Knowledge Base Article Q282010.
6) It is not currently clear if this issue was addressed in Microsoft Security Bulletin MS02-043. However, applying the patch for that issue will significantly mitigate potential exploitation of this vulnerability by preventing attackers from using the vulnerable extended stored procedures to cause the SQL Server Agent to reconnect to the database with a higher privilege level. The bulletin includes instructions for obtaining the patch. Check for upgrades at Microsoft's Download site.
7) Microsoft has released the following patch for SQL Server 2000: Patch Q316333
We recommend upgrading to the latest SQL Server Service Pack which is SP4. Please refer the Microsoft SQL Server Product Page for more details and instructions on downloading and installing the latest Service Pack.
3
|
Microsoft Windows 2000 RDP DoS Vulnerability |
Note: You are only vulnerable if you run Windows 2000 and didn't patch your server against this vulnerability.
Remote Desktop Protocol (RDP) enables remote users to communicate through applications over the network using keystrokes and mouse-clicks. Windows 2000 Server and Advanced Server are subject to a denial of service condition. Submitting multiple malformed packets to the RDP services port will cause the server to crash, and any unsaved data will be lost.
As a result of this vulnerability being exploited, the Terminal Server application will stop responding. Therefore, you must manually restart the server in order to regain normal functionality. Other processes running on the Windows 2000 Server will continue to work normally.
Malicious users could also use the denial of service condition to assist them in further attack against this host.
3
|
Microsoft Windows Terminal Server Service (RDP Protocol) DoS Vulnerability |
Microsoft Windows Terminal Server centralizes management of user applications for each client connected to the server. User applications and desktops are transmitted over the network and displayed via a terminal emulation program.
Due to a flaw in the Microsoft Terminal Server service, it's possible for a host to be led to consume all available memory resources. This behavior is the result of flaws in the server's memory management.
Malformed data packets submitted repeatedly to an affected host on port 3389 will result in the accumulation of allocated memory that is not freed after use. It's possible to exhaust the memory resources of the target system, potentially impacting the Terminal service, as well as other applications running on the affected host.
Note: Microsoft Windows Terminal Server contains another Denial of Service vulnerability. For information on this issue, read Microsoft Security Bulletin MS01-006.
3
|
Microsoft Windows 2000 Lanman Denial of Service Vulnerability |
port 445/tcp
|
Submitting malformed data to port 445 could cause the Lanman service to consume high CPU and Kernel mode memory usage.
IMPORTANT: The configuration in the first method may not be supported in an environment where programs that require NetBIOS support are being used.
Method 1: Disable NetBIOS over TCP/IP (which also disables port 445).
Method 2: Create and then set the MaxWorkItems value in the registry to a value that the computer can support.
3
|
Microsoft Windows 9x / NT 4.0 / 2000 NetBIOS Cache Corruption Vulnerability |
port 138/udp
|
The CIFS Browser Protocol generates a list of network resources and is used in services such as My Neighborhood or My Network Places. It also defines a number of Browse Frames encapsulated within a NetBIOS datagram. Information contained in a NetBIOS datagram is extracted and inserted into the NetBIOS cache when a Browse Frame request is received on UDP port 138. This information includes a source and destination NetBIOS name, second source IP address, and IP headers.
A remote malicious user can transmit unicast or broadcast UDP datagrams, which can result in the redirection of NetBIOS name resolution to IP address resolution forwarding to an arbitrary IP address under their control. Once the cache is corrupted with a UDP datagram, it is no longer a prerequisite to predict Transaction IDs (which is reportedly an easily predictable 16-bit ID to begin with).
To flush a dynamic entry in the cache, one can send a Postive Name Query response that provides a different IP address to NetBIOS name mapping.
Workarounds provided by COVERT Labs:
3
|
Microsoft IIS 4.0/5.0 Session ID Cookie Marking vulnerability |
port 80/tcp
|
We do not perform active tests for this vulnerability; therefore, if you know that you've already applied the appropriate patch (see the Solution field below), you can safely disregard this notice.
Microsoft IIS Version 4.0 Update
Microsoft IIS Version 5.0 Update
3
|
Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability |
port 80/tcp
|
Note: To avoid causing a denial of service on your server, we don't perform active tests for this vulnerability. Therefore, if you've already applied the appropriate patches, you can safely ignore this warning. (For information on patches, see the Solution field below.)
By sending multiple requests with a malformed URL (as described in the Description field), responsiveness of your Web server, and eventually other services on it, may decrease significantly.
For more information on this vulnerability, refer to Microsoft's Security Bulletin MS00-023.
A patch for Internet Information Server (IIS) Version 4.0 is available at the following location:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20292
A patch for Internet Information Server(IIS) Version 5.0 is available at the following location:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20286
3
|
Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability |
port 80/tcp
|
Microsoft IIS Version 4.0 and Version 5.0 contain a denial of service vulnerability. If you've already applied the appropriate patch, then you can safely ignore this warning.
By sending a specially crafted URL containing malformed file extension information to Microsoft IIS Version 4.0 or 5.0, a malicious user can consume all CPU usage, which will halt the program's services.
3
|
Microsoft MSDTC Service Denial of Service Vulnerability |
It has been reported that it may be possible to cause this service to crash by sending 1024 bytes of random data to its listening port, port 3372 by default. On some systems, this may cause the service to crash immediately, while on those that fail to crash, larger data packets and multiple connections will have no effect.
Note: The existence of this vulnerability has not been confirmed by Microsoft.
3
|
Microsoft Remote Procedure Call Service DoS Vulnerability |
DCE/RPC is a proprietary protocol developed by Microsoft, and serves the same purpose as Unix RPC (Remote Procedure Call). It allows a computer to remotely call procedures on another machine. Like Unix RPC, Microsoft RPC makes use of an Interface Definition Language, which is used to generate a skeleton program (for the server side) and a stub program (for the client side).
The skeleton program makes sure that procedure arguments are properly typed before passing them to the procedure implementation. The implementation checks that the argument values are correct (for example, an integer may have the right type but have a value outside the allowed range). Many RPC implementers fail to perform this check correctly. Therefore, an attacker that sends garbage (i.e. zero filled packets) to an RPC port, may cause unpredictable behavior of the associated RPC service.
It seems that Windows RPC is enabled on this machine. By exploiting this vulnerability an attacker can either perform a Denial of Service attack by causing the system or key services to crash or may run arbitrary code on the compromised host.
As a workaround, you can filter RPC ports at the firewall level.
MSRPC Port |
1025 |
1034 |
1026 |
3
|
Microsoft Windows Media Services Severed Connection DoS Vulnerability |
port 1755/tcp
|
In the event that a client establishes a connection and then stops it abruptly in a particular fashion, Windows Media Services will not release the resources it allocated to that particular client. If Windows Media Services were to receive these connections repeatedly, resources would become depleted and diminish to such a level that Windows Media Services would no longer be able to properly service clients.
Microsoft released the following patch for Microsoft Windows Media Services Version 4.0 and Version 4.1:
Microsoft patch WMSU35924
2
|
Microsoft Windows NetBIOS Name Service Reply Information Leakage Weakness |
The source of this issue is a flaw in how NetBT pads datagrams. A larger buffer is allocated than is needed when NetBIOS is generating a Name Service reply, and this buffer is not adequately initialized before the reply is generated. As a result, the reply may contain random fragments of system memory, some of which could potentially contain sensitive information. It is reported that the amount of padding that is required to cause minute amounts of memory to be disclosed will normally be 15 bytes or less. This amount will be derived from a previous memory operation. The expected behavior is for the datagram padding to be blank.
If you do not want to apply the patch, a workaround is to restrict access to UDP port 137.
3
|
Accounts Enumerated From SAM Database Whose Passwords Do Not Expire |
3
|
NetBIOS Bindings Information |
Name | Service |
..__MSBROWSE__. | Master Browser |
DEMO02 | File Server Service |
DEMO02 | Workstation Service |
INet~Services | Domain Controllers |
IS~DEMO02 | IIS |
WORKGROUP | Master Browser |
WORKGROUP | Domain Name |
WORKGROUP | Browser Service Elections |
3
|
NetBIOS Shared Folders |
Device Name | Comment | Type | Label | Size | Description |
IPC$ | Remote IPC | 3 | |||
ADMIN$ | Remote Admin | 0 | |||
C$ | Default share | 0 |
3
|
Microsoft IIS ISAPI Application Filters Mapped To Home Directory |
port 80/tcp
|
2
|
Windows Effective Password Policy Information Gathering Via SAM Database |
Minimum Password Age in Days
Maximum Password Age in Days
Minimum Password Length in Characters
Password History (Number of old passwords remembered)
The policy is the effective policy, which is a combination of the local policy settings (if any) and the domain-wide policy settings made on the Domain Controller(s) for the domain.
This probe requires authentication to be successful.
2
|
Windows Domain Effective Account Lockout Policy Information Gathered Via SAM Database |
It should be noted that if the Domain Controller/Active Directory on this domain enforces a policy as well, the Domain Controller policy will override the local policies (if any) of each host. Further, it takes up to a couple of minutes for changes on the Domain Controller policy to be propogated to all the individual hosts on that domain.
2
|
Operating System Detected |
1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.
Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.
2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).
3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.
4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.
Operating System | Technique | ID | |
Windows 2000 | TCP/IP Fingerprint | U1263:25 | |
Windows 2000 Server | SRVSVC | Interface | |
Windows 5.0/Windows 2000 LAN Manager | CIFS via TCP Port 139 |
2
|
Open DCE-RPC / MS-RPC Services List |
Description | Version | TCP Ports | UDP Ports | HTTP Ports | NetBIOS/CIFS Pipes |
DCE Remote Management | 1.0 | 1025 | |||
IMS Admin Base | 0.0 | 1034 | |||
Device Manager | 1.0 | \pipe\browser | |||
License Logging Service | 0.0 | \pipe\llsrpc | |||
Microsoft Distributed Transaction Coordinator | 1.0 | 1025 | |||
Microsoft Local Security Architecture | 0.0 | \PIPE\lsarpc | |||
Microsoft Scheduler Control Service | 1.0 | 1026 | |||
Microsoft Security Account Manager | 1.0 | \PIPE\samr | |||
Microsoft Server Service | 3.0 | \PIPE\browser, \PIPE\srvsvc | |||
Microsoft Spool Subsystem | 1.0 | \PIPE\spoolss | |||
Microsoft Task Scheduler | 1.0 | 1026 | |||
Microsoft Workstation Service | 1.0 | \PIPE\wkssvc | |||
RPC Browser | 0.0 | \PIPE\browser | |||
Simple Mail Transfer Protocol | 1.0 | 1034 | |||
Simple Mail Transfer Protocol | 2.0 | 1034 | |||
Simple Mail Transfer Protocol | 3.0 | 1034 | |||
(Unknown Service) | 0.0 | 1025, 1034 | |||
(Unknown Service) | 0.0 | 1034 | |||
DCOM Class Factory | 0.0 | 1034 |
2
|
Real Name of Built-in Guest Account Enumerated |
2
|
Microsoft SQL Server Version Information Gathered |
The version information is shown in the Results section. "CurrentVersion" gives the version of the original Microsoft SQL Server installation on the target host. "CSDVersion", if present, gives the updated version due to any later patches/service packs installed on the host. The version obtained from the TCP port (typically 1433) is listed separately as well (if found).
Though the registry value and the one got from TDS protocol are reliable to a good degree in identifying the patch levels like service packs and cumulative patches, they may not reflect version changes due to all hotfixes.
Further, the SQL version found can be correlated with the SQL patch information from the SQLSecurity.com's version-mapping table.
2
|
SMTP Banner |
port 25/tcp
|
2
|
SMTP Service Detected |
port 25/tcp
|
2
|
Web Server Probed For Various URL-Encoding Schemes Supported |
port 80/tcp
|
Per this paper by Daniel Roelker that was presented at Defcon 11, popular Web servers like Microsoft IIS support a variety of encoding schemes for the URLs. These include Percent-escaped Hex Encoding, Double-percent Escaped Hex Encoding, Microsoft's %U Encoding, Percent-escaped 2-Byte UTF-8 Encoding, and Raw 2-Byte UTF-8 Encoding.
For a sample HTTP GET request, GET /. HTTP/1.0, the following illustrates the encoded URI under these schemes:
Percent-escaped Hex Encoding: GET /%2e HTTP/1.0 Double-percent Escaped Hex Encoding: GET /%252e HTTP/1.0 Percent-escaped 2-Byte UTF-8 Encoding: GET /%C0%AE HTTP/1.0 Raw 2-Byte UTF-8 Encoding: GET /\xC0\xAE HTTP/1.0 (Actual raw 0xC0 and 0xAE bytes) Microsoft's %U Encoding: GET /%u002e HTTP/1.0
The supported encoding schemes are listed in the Results section.
URI encoding is relevant to Web server security since, as mentioned in the paper above, attackers could launch HTTP attacks while at the same time obfuscating the URIs to evade detection by Intrusion Detection Systems that are not capable of decoding the URIs.
1
|
DNS Host Name |
IP address | Host name |
XXX.XXX.XXX.XXX | demo02.treutler.de |
1
|
ICMP Replies Received |
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.
ICMP Reply Type | Triggered By | Additional Information |
Echo (type=0 code=0) | Echo Request | Echo Reply |
Timestamp (type=14 code=0) | Timestamp Request | 06:20:43 GMT |
Unreachable (type=3 code=2) | IP with High Protocol | Protocol Unreachable |
Unreachable (type=3 code=3) | UDP | Port Unreachable |
1
|
Traceroute |
Hops | IP | Round Trip Time | Probe |
1 | 195.154.210.158 | 1.53ms | ICMP |
2 | 212.129.22.5 | 3.31ms | ICMP |
3 | 212.129.8.17 | 0.71ms | ICMP |
4 | 212.129.8.13 | 0.56ms | ICMP |
5 | 213.200.76.193 | 0.62ms | ICMP |
6 | 213.200.81.253 | 77.57ms | ICMP |
7 | 208.173.135.177 | 83.21ms | ICMP |
8 | 204.70.192.206 | 84.00ms | ICMP |
9 | 204.70.192.149 | 158.36ms | ICMP |
10 | 208.172.147.110 | 157.81ms | ICMP |
11 | 216.34.3.66 | 595.88ms | UDP |
12 | XXX.XXX.XXX.XXX | 158.10ms | ICMP |
1
|
Target Network Information |
1
|
Internet Service Provider |
1
|
Administrator Account's Real Name Found From LSA Enumeration |
Windows systems by default have the administrator account's name configured as "Administrator". This can very easily be changed to a non-default value (like root, for example) to harden security against password bruteforcing.
LSA, internally, refers to user accounts by what are called RIDs (Relative IDs) instead of the friendlier names (like "Administrator") used only for GUI and display purposes. The administrator account on any Windows system always has a RID of 500, even if the name has been changed.
The scanner probed the LSA for the name that maps to the RID of 500, which is the administrator account name, changed or unchanged. The name is listed in the Result section below.
1
|
Disabled Accounts Enumerated From SAM Database |
1
|
Host Names Found |
Host Name | Source |
demo02.treutler.de | FQDN |
DEMO02 | NetBIOS |
DEMO02 | MSSQL Monitor |
DEMO02 | NTLM NetBIOS |
demo02 | NTLM DNS |
1
|
Host Scan Time |
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.
1
|
NetBIOS Host Name |
1
|
NetBIOS Workgroup Name Detected |
1
|
Open TCP Services List |
Port | IANA Assigned Ports/Services | Description | Service Detected | OS On Redirected Port |
25 | smtp | Simple Mail Transfer | smtp | |
80 | www | World Wide Web HTTP | http | |
139 | netbios-ssn | NETBIOS Session Service | netbios ssn | |
445 | microsoft-ds | Microsoft-DS | microsoft-ds | |
1025 | blackjack | network blackjack | msrpc | |
1026 | nterm | remote_login network_terminal | msrpc | |
1034 | unknown | unknown | msrpc | |
1433 | ms-sql-s | Microsoft-SQL-Server | mssql | |
1755 | netshow | ms-streaming | Microsoft Multimedia Stream | |
3372 | tip2 | TIP 2 / MSDTC | msdtc | |
3389 | ms-wbt-server | MS WBT Server | win remote desktop | |
6666 | ircu | IRCU | unknown | |
8521 | unknown | unknown | http |
1
|
Open UDP Services List |
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.
Port | IANA Assigned Ports/Services | Description | Service Detected |
135 | msrpc-epmap | epmap DCE endpoint resolution | unknown |
137 | netbios-ns | NETBIOS Name Service | netbios ns |
138 | netbios-dgm | NETBIOS Datagram Service | unknown |
445 | microsoft-ds | Microsoft-DS | unknown |
500 | isakmp | isakmp | unknown |
1027 | unknown | unknown | unknown |
1033 | unknown | unknown | unknown |
1035 | unknown | unknown | unknown |
1434 | ms-sql-m | Microsoft-SQL-Monitor | mssql monitor |
1
|
Host Responds to TCP SYN Packet with Other Flags On with SYN ACK |
1
|
IP ID Values Randomness |
1
|
Degree of Randomness of TCP Initial Sequence Numbers |
1
|
Windows Authentication Method |
The service also attempts to authenticate using common credentials. You should verify that the credentials used for successful authentication were those that were provided in the Windows authentication record. User-provided credentials failed if the discovery method shows "Unable to log in using credentials provided by user, fallback to NULL session". If this is the case, verify that the credentials specified in the Windows authentication record are valid for this host.
User Name | (none) |
Domain | (none) |
Authentication Scheme | NULL session |
Security | User-based |
SMB Signing | Disabled |
Discovery Method | NULL session, no valid login credentials provided or found |
1
|
Microsoft SQL Server Cluster Presence Check |
port 1434/udp
|
1
|
Network Adapter MAC Address |
Method | MAC Address | Vendor |
NBTSTAT | 00:E0:81:21:05:74 | TYAN COMPUTER CORP. |
1
|
List of Web Directories |
port 80/tcp
|
Directories |
/iisadmin/ |
/scripts/ |
/msadc/ |
/iishelp/ |
/Printers/ |
/MSADC/ |
1
|
Microsoft Data Access Components RDS Enabled |
port 80/tcp
|
In versions of MDAC prior to Version 2.7, the RDS component contains an unchecked buffer that can result in data overwriting the heap. See Microsoft Security Bulletin MS02-065 for more details.
1
|
Web Server Version |
port 80/tcp
|
Server Version | Server Banner |
Microsoft-IIS/5.0 | Microsoft-IIS/5.0 |
1
|
HTTP method TRACE and/or TRACK Enabled |
port 80/tcp
|
The exact method(s) used are shown in the Results section.
1
|
Web Server Version |
port 8521/tcp
|
Server Version | Server Banner |
Microsoft-IIS/5.0 | Microsoft-IIS/5.0 |
XXX.XXX.XXX.XXX (demo03.treutler.de) | Solaris 8 |
|
|
5
|
Sun Solaris SAdmind Client Credentials Remote Administrative Access Vulnerability |
A problem has been discovered in the Sun Solaris "sadmin" service. Because of this issue, it may be possible for a remote user to gain unauthorized administrative access to the target.
The problem is in the handling of authentication credentials. In the default configuration, the "sadmin" service uses the AUTH_SYS or AUTH_UNIX RPC authentication mechanism, which is vulnerable to spoofing attacks. Since the authentication credentials (uid, gid, and hostname of client) are completely in an attacker's control, an attacker can circumvent any access restrictions the service may have in place.
Note: The "sadmin" service is enabled by default.
The service may be disabled by commenting the service out of the inetd.conf configuration file, and restarting inetd.
The service may be reconfigured to use stronger AUTH_DES authentication instead. To do this, append "-S 2" to the inetd.conf configuration and restart inetd. Please check Sun's Sadmind Alert, which provides details about this configuration process.
4
|
SSH Protocol Version 1 Supported |
port 22/tcp
|
Multiple vendors' implementations are vulnerable due to the fact that these are protocol design errors. Version 2 of the SSH protocol fixed these errors.
Note: Do not enable SSH Version 1 Fallback since systems with upgraded versions of SSH and with Fallback Version 1 enabled are still vulnerable.
SSH1 supported | yes |
Supported ciphers for SSH1 | 3des, blowfish |
Supported authentications for SSH1 | RSA, keyboard_interactive, password |
3
|
finger Service Discloses Logged Users |
port 79/tcp
|
3
|
"Finger 0@" Information about Logged Users Disclosure Vulnerability |
port 79/tcp
|
3
|
Finger Daemon Accepts Forwarding of Requests |
port 79/tcp
|
Additionally, a denial of service can be implemented on networks using NIS (Network Information Service). This is done by executing a finger command containing hundreds of nested '@' characters. This generates a lot of traffic in the network and consumes a lot of the NIS master server's CPU.
3
|
Web Server Vulnerable to Cross-Site Scripting Attacks |
port 898/tcp
|
A malicious user can exploit this vulnerability to cause JavaScript commands or embedded scripts to be executed by any user who clicks on the hyperlink. Upon clicking the hyperlink, your Web server will generate an error message including the specified or embedded script. The specified or embedded script is executed in the client's browser and treated as content originating from the target server returning the error message (even though the scripting may have originated from another site entirely).
This issue is fixed in Sun ONE / iPlanet Web Server 4.1 Service Pack 12 and above. The latest service pack is available for download from Sun ONE Web Server Enterprise Edition 4.1 Service Pack 13.
For Microsoft IIS Web server, apply the cumulative patch described in Microsoft Security Bulletin MS02-018. No additional service packs are planned for Windows NT 4.0. IIS 5.0 fixes will be included in Windows 2000 Service Pack 3. IIS 5.1 fixes will be included in Windows XP Service Pack 1.
Lotus Domino had this issue with Domino R5 Web server. Check the Lotus advisory SPR# JCHN4V2HUY. We also advise you to upgrade to the latest version.
3
|
Sun Management Center (Tomcat) Error Message Information Disclosure Vulnerability |
port 898/tcp
|
A problem in the handling of error messages was identified in Sun Management Center. This issue enables malicious users to gain sensitive information about vulnerable hosts. The problem is in the returning of error messages by Sun Management Center. The Sun Management Center server typically runs on TCP port 898.
The Sun Management Center returns an error message when a user sends a request for a specific file in the file system using directory traversal strings. The problem is that a different error message is returned when the file exists versus when the file does not exist.
When the requested file does not exist, the service gives a response similar to the following.
Error: 404
File Not Found /stuff/blah
When the requested file does exist, the service gives the following response.
Error: 404
No detailed message
Because of these different error messages, a malicious user could determine key system configuration variables. Information gained as a result could be used in further attacks against system and network resources.
2
|
Global User List |
User Name | Source Vulnerability (TreutlerID) |
root | 74045 |
daemon | 31003 |
bin | 31003 |
sys | 31003 |
wkandek | 31003 |
ldonayre | 31003 |
scanner | 31003 |
adm | 31003 |
lp | 31003 |
uucp | 31003 |
nuucp | 31003 |
listen | 31003 |
nobody | 31003 |
nobody4 | 31003 |
noaccess | 31003 |
2
|
TCP Sequence Number Approximation Based Denial of Service |
The cause of the vulnerability is that affected implementations will accept TCP sequence numbers within a certain range, known as the acknowledgement range, of the expected sequence number for a packet in the session. This is determined by the TCP window size, which is negotiated during the three-way handshake for the session. Larger TCP window sizes may be set to allow for more throughput, but the larger the TCP window size, the more probable it is to guess a TCP sequence number that falls within an acceptable range. It was initially thought that guessing an acceptable sequence number was relatively difficult for most implementations given random distribution, making this type of attack impractical. However, some implementations may make it easier to successfully approximate an acceptable TCP sequence number, making these attacks possible with a number of protocols and implementations.
This is further compounded by the fact that some implementations may support the use of the TCP Window Scale Option, as described in RFC 1323, to extend the TCP window size to a maximum value of 1 billion.
This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.
There are a few factors that may present viable target implementations, such as those which depend on long-lived TCP connections, those that have known or easily guessed IP address endpoints and those implementations with easily guessed TCP source ports. It has been noted that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack, due to the use of long-lived TCP sessions and the possibility that some implementations may use the TCP Window Scale Option. As a result, this issue is likely to affect a number of routing platforms.
Another factor to consider is the relative difficulty of injecting packets into TCP sessions, as a number of receiving implementations will reassemble packets in order, dropping any duplicates. This may make some implementations more resistant to attacks than others.
It should be noted that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further.
Various implementations and products including Check Point, Cisco, Cray Inc, Hitachi, Internet Initiative Japan, Inc (IIJ), Juniper Networks, NEC, Polycom, and Yamaha are currently undergoing review. Contact the vendors to obtain more information about affected products and fixes. NISCC Advisory 236929 - Vulnerability Issues in TCP details the vendor patch status as of the time of the advisory, and identifies resolutions and workarounds.
The Internet Engineering Task Force (IETF) has developed an Internet-Draft titled Transmission Control Protocol Security Considerations that addresses this issue.
Workaround:
The following BGP-specific workaround information has been provided.
For BGP implementations that support it, the TCP MD5 Signature Option should be enabled. Passwords that the MD5 checksum is applied to should be set to strong values and changed on a regular basis.
Secure BGP configuration instructions have been provided for Cisco and Juniper at these locations:
http://www.cymru.com/Documents/secure-bgp-template.html
http://www.qorbit.net/documents/junos-bgp-template.pdf
2
|
Hidden RPC Services |
When the portmapper/rpcbind is removed or firewalled, standard RPC client programs fail to obtain the portmapper list. However, by sending carefully crafted packets, it's possible to determine which RPC programs are listening on which port. This technique is known as direct RPC scanning. It's used to bypass portmapper/rpcbind in order to find RPC programs running on a port (TCP or UDP ports). On Linux servers, RPC services are typically listening on privileged ports (below 1024), whereas on Solaris, RPC services are on temporary ports (starting with port 32700).
Name | Program | Version | Protocol | Port |
nlockmgr | 100021 | 1-4 | tcp | 4045 |
portmap/rpcbind | 100000 | 2-4 | tcp | 111 |
rpc.cmsd | 100068 | 2-5 | tcp | 32785 |
rpc.cmsd | 100068 | 2-5 | udp | 32789 |
rquotad | 100011 | 1 | udp | 32783 |
rstatd | 100001 | 2-4 | udp | 32788 |
rusersd | 100002 | 2-3 | tcp | 32772 |
rusersd | 100002 | 2-3 | udp | 32784 |
sadmind | 100232 | 10 | udp | 32782 |
sprayd | 100012 | 1 | udp | 32786 |
status | 100024 | 1 | tcp | 32771 |
status | 100024 | 1 | udp | 32785 |
ttdbserver | 100083 | 1 | tcp | 32773 |
walld | 100008 | 1 | udp | 32787 |
2
|
"rstatd" RPC Service System Information Disclosure Vulnerability |
On SunOS, the length of time that the host takes to boot may also be of interest to unauthorized users since this value is sometimes used to generate ID or tokens internally.
2
|
Valid Logins Guessed with SMTP EXPN Command |
port 25/tcp
|
2
|
Valid Logins/Aliases Guessed with SMTP VRFY Command |
port 25/tcp
|
2
|
UDP Test-Services |
Moreover, on older Operating Systems, Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server. This can be accomplished with attacks like UDP bombs or UDP packet storms.
2
|
TCP Test-Services |
2
|
Remote Login Service Open |
If you cannot install one of these programs, then you should ensure that a TCP Wrapper is installed to restrict the hosts that can connect to this service.
2
|
Remote Execution Service Open |
2
|
Remote Shell Service Open |
Malicious users heavily exploit the RSH service to log onto hosts in trust relationships. Remote users do not need a password to log into accounts that the ".rhosts" file has authorized them for. This can be done for all users with a general file called "/etc/hosts.equiv".
Two plus signs (+ +) in an ".rhosts" file translates to "anybody can log into my account without having to supply a password". A line with a single plus sign (+) in the "/etc/hosts.equiv" file translates to "any user on any system that can connect to this machine can log into the same user name on this machine provided it exists on the local host".
Install an upgrade of your rlogind server. Be sure to use a secure replacement for rlogin, such as Secure Shell (www.ssh.com), or France Secure Shell (FSH) in France in appliance with crypto regulations.
2
|
Web Directories Listable Vulnerability |
port 898/tcp
|
Listable Directories |
/images/ |
2
|
Web Server HTTP Trace/Track Method Support Cross-Site Tracing Vulnerability |
port 898/tcp
|
A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.
The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.
Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.
The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.
Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} ^TRACE RewriteRule .* - [F] </IfModule>With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.
A slightly tighter fix is to use:
<IfModule mod_rewrite.c> RewriteEngine on RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$ RewriteRule .* - [F] </IfModule>
Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.
URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.
Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.
For more details about other web servers : Cert Advisory.
2
|
Valid Logins Guessed with SMTP EXPN Command |
port 587/tcp
|
2
|
Valid Logins/Aliases Guessed with SMTP VRFY Command |
port 587/tcp
|
1
|
ICMP Timestamp Request |
However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) are necessary for proper behavior of Operating System TCP/IP stacks.
It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.
1
|
ICMP Mask Reply |
Filter ICMP messages of type "Information Request" and "Information Request Reply" at the firewall level.
Some System Administrators choose to filter most types of ICMP messages for various reasons. For example, they may want to protect their internal hosts from ICMP-based Denial Of Service attacks, such as the "Ping of Death" or "Smurf" attacks.
However, you should never filter all ICMP messages, because some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc.) are necessary for proper behavior of Operating System TCP/IP stacks. It may be wiser to contact your network consultants for advice since this issue impacts your overall network reliability and security.
1
|
"rquotad" RPC Service Present |
1
|
sprayd RPC Service Present |
5
|
Sun Solaris RWall Daemon Syslog Format String Vulnerability |
A problem with Solaris could allow a remote user to gain local access and elevated privileges. The problem is with the rwall daemon. The rwall daemon is a remote "wall" facility, designed to send system broadcast messages. It works by passing requests from system to system via RPC, and handling the starting of the rwall daemon with inetd.
It should be noted that this vulnerability requires the functioning of inetd, as well as that of rwalld. Systems that have disabled rwalld from the inetd configuration, or have disabled inetd altogether, are not vulnerable to this issue.
Sun Platform - Patch Number
Sun SunOS 2.5.1 - 11289-01
Sun SunOS 2.6 - 112893-01
Sun SunOS 2.6_x86 - 112894-01
Sun SunOS 7.0 - 112899-01
Sun SunOS 7.0_x86 - 112900-01
Sun SunOS 8.0 - 112846-01
Sun SunOS 8.0_x86 - 112847-01
5
|
ToolTalk Buffer Overflow Vulnerability |
The following platforms are often vulnerable: Silicon Graphics running IRIX Versions 5.3, 5.4, 6.2, 6.3 and 6.4; Hewlett Packard running HP-UX Versions 10.10, 10.20, 10.30 and 11.00; Sun Microsystems running Solaris Versions 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5, 2.5_x86, 5.4, 5.4_x86, 2.3 and Sun OS Versions 4.1 and 4.1.3_U1; IBM running AIX Versions 4.1.X, 4.2.X and 4.3.X.
This vulnerability is often due to a default installation of the Operating System.
5
|
Solaris cachefsd Buffer Overrun Vulnerability |
A buffer overflow exists in cachefsd that may allow for local attackers to obtain root privileges. The overflow is due to insufficient bounds checking on user-supplied mounts.
Further technical details are forthcoming.
5
|
Sun Solaris snmpXdmid Buffer Overflow Vulnerability |
Sun Microsystem's Solaris operating environment Versions 2.6, 7, and 8 ship with a service called 'snmpXdmid'.
SNMP and DMI are commonly used remote network and system management protocols. They allow administrators to view and set the properties of network devices and hosts in a standardized manner. To bridge between the two different protocols, Sun Solaris ships with a daemon called 'snmpXdmid', the SNMP to DMI mapping daemon. This service is responsible for receiving DMI requests and translating them to SNMP and vice-versa.
During its operation, snmpXdmid registers itself with RPC service 1000249, 'dmid'. Any received DMI events, or 'indications', are translated by snmpXdmid into SNMP traps. When a specific 'malformed' indication is received by the dmid service, a buffer overflow condition can be triggered. The specific details about how the 'indication' is malformed are not known at this time.
The overflow occurs after snmpXdmid receives the indication and is translating it into an SNMP trap. It is likely that the overflow is stack-based and involves parts or all of a stack frame being overwritten with attacker-supplied data (from within the DMI request).
Note: There are at least three exploits in active use on the Internet.
Job de Haas <job@dot.itsx.com> provided the following workaround in his advisory:
"For 99% of the cases the daemon can be safely turned off by turning off DMI completely. This can be achieved by renaming /etc/rc?.d/S??dmi to /etc/rc?.d/K07dmi and calling '/etc/init.d/init.dmi stop' (where ? is the appropriate runlevel). It is also wise to remove all permissions from the binary: chmod 000 /usr/lib/dmi/snmpXdmid"
5
|
OpenSSH Multiple Memory Management Vulnerabilities |
port 22/tcp
|
Many vendors backport the patches to packages based on earlier versions of
openssh. The following packages have been reported to address this issue:
Solaris 9 SPARC: patch 113273-04 or later
Solaris 9 x86: patch 114858-03 or later
AIX-5.2 opensshi-aix52 3.6.1p2_52
AIX-5.1 opensshi-aix51 3.6.1p2_51
HP-UX B.11.22 T1471AA_A.03.61.002_HP-UX_B.11.22_IA.depot
HP-UX B.11.11 T1471AA_A.03.61.002_HP-UX_B.11.11_32+64.depot
HP-UX B.11.00 T1471AA_A.03.61.002_HP-UX_B.11.00_32+64.depot
redhat: openssh-3.1p1-14
fedora: openssh-3.6.1p2-19
mandrake: openssh-3.6.1p2-1.1
debian: openssh-krb5_3.4p1
suse-8.2: openssh-3.5p1-106
suse-8.1, 8-0: openssh-3.4p1-214
Mac OS X 10.2.8
As a workaround, configure OpenSSH to run with privilege separation. This configuration will reduce the impact of any latent vulnerabilities.
5
|
Sendmail Header Processing Buffer Overflow Vulnerability |
port 25/tcp
|
A remotely exploitable vulnerability has been discovered in Sendmail. The vulnerability is due to a buffer overflow condition in the SMTP header parsing component. Remote attackers may exploit this vulnerability by connecting to target SMTP servers and transmitting malformed SMTP data to them.
The overflow condition occurs when Sendmail processes incoming e-mail messages with multiple addresses in a field such as "From:" or "CC:". One of the checks to ensure that the addresses are valid is flawed, resulting in a buffer overflow condition.
Sendmail Versions 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to Version 8.12.8 or apply available patches to prior versions of the 8.x tree.
SGI released a security advisory (20030301-01-P) containing fixes. Users of IRIX 6.5.15 and later are urged to apply the appropriate patches. Users of IRIX 6.5.14 and earlier should upgrade their installations to IRIX 6.5.20.
Sendmail in OpenBSD-current has been upgraded to Version 8.12.8. Patches have also been released for OpenBSD Versions 3.2 and 3.1. Apply patches or upgrade.
HP released fixes for Tru64 UNIX.
IBM has released a patchs AIXAPAR:IY40500, AIXAPAR:IY40501, AIXAPAR:IY40502 which address this issue.
FreeBSD released an advisory containing a security patch as well as patched binary releases. Users are advised to upgrade as soon as possible. Administrators are advised to upgrade to Version 8.12.8. Patches are available for 8.12.x, 8.11.x, 8.10.x and 8.9.x versions from SendMail's Web site.
5
|
Sendmail Address Prescan Possible Memory Corruption Vulnerability |
port 25/tcp
|
Sendmail is affected by a memory corruption condition that may or may not be remotely exploitable. The potentially exploitable flaw is present in the prescan() procedure, one that is used for processing e-mail addresses in SMTP headers. This function is implemented in the source code file "parseaddr.c".
This vulnerability is due to a logic error in the conversion of a char to an integer value. More information can be obtained from Cert Advisory - CA-2003-12.
5
|
Sun Solaris FTPd glob() Expansion LIST Heap Overflow Vulnerability |
port 21/tcp
|
When processing user input, the FTP daemon uses 'glob()' functions to expand wildcards and meta-characters in file paths, just as shells do. A good example of this is use of the tilde (~) character. The glob() function replaces this character in the file path with the path to the user's home directory. The output, an expanded path, is then used by the FTP daemon to construct a command string for the execution of '/bin/ls'. If the source string is too long, then a buffer overflow condition occurs when constructing the command string.
This buffer overflow occurs in memory that is dynamically allocated. It may be possible for attackers to exploit this vulnerability and execute arbitrary code on the affected host. This could be accomplished by overwriting pointers in neighboring malloc headers. If exploited successfully, malloc could be tricked into writing arbitrary values to attacker-supplied locations in memory when free() is called on the targeted chunk. By overwriting something, such as a PLT entry or function return address on the stack, an attacker may be able to execute arbitrary code.
To exploit this, the attacker must be able to create directories on the target host. In most cases, this limits exploitability to local users. On systems where anonymous FTP users can write to a directory, such as 'incoming/', remote exploitation may be a threat.
SunOS 5.6 (Patch ID 106301-06)
SunOS 5.7 (Patch ID 110646-05)
SunOS 5.8 (Patch ID 111606-04)
5
|
Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability |
port 25/tcp
|
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
5
|
Sun Solaris fs.auto Remote Buffer Overrun Vulnerability |
port 7100/tcp
|
A remotely exploitable buffer overrun condition has been reported in the implementation of fs.auto distributed with recent versions of Solaris. Specifically, Solaris 2.5.1, 2.6, 7, 8 & 9 on both the x86 and Sparc architectures ship with a vulnerable binary. The buffer overrun is due to inadequate bounds checking on client-supplied data prior to a sensitive memory copy operation that occurs during the "Dispatch()" routine.
SPARC * Solaris 2.5.1 no-patch * Solaris 2.6 patch 108129-05 * Solaris 7 patch 108117-06 * Solaris 8 patch 109862-03 * Solaris 9 patch 113923-02 Intel * Solaris 2.5.1 no-patch * Solaris 2.6 patch 108130-05 * Solaris 7 patch 108118-06 * Solaris 8 patch 109863-03A patch is not available for Solaris 2.5.1. If you are running Solaris 2.5.1, upgrade to a more recent version so that you can apply a patch.
As a workaround, you can disable the fs.auto service. To disable fs.auto, comment out its entry in the inetd configuration file, and then restart inetd. The entry should appear as:
#fs stream tcp wait nobody /usr/openwin/lib/fs.auto fsBe sure to stop and re-start the inetd service. Sending a HUP signal to its process will cause it to re-read "/etc/inetd.conf".
5
|
Sendmail Prescan() Variant Remote Buffer Overrun Vulnerability |
port 587/tcp
|
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
5
|
Sendmail Header Processing Buffer Overflow Vulnerability |
port 587/tcp
|
A remotely exploitable vulnerability has been discovered in Sendmail. The vulnerability is due to a buffer overflow condition in the SMTP header parsing component. Remote attackers may exploit this vulnerability by connecting to target SMTP servers and transmitting malformed SMTP data to them.
The overflow condition occurs when Sendmail processes incoming e-mail messages with multiple addresses in a field such as "From:" or "CC:". One of the checks to ensure that the addresses are valid is flawed, resulting in a buffer overflow condition.
Sendmail Versions 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to Version 8.12.8 or apply available patches to prior versions of the 8.x tree.
SGI released a security advisory (20030301-01-P) containing fixes. Users of IRIX 6.5.15 and later are urged to apply the appropriate patches. Users of IRIX 6.5.14 and earlier should upgrade their installations to IRIX 6.5.20.
Sendmail in OpenBSD-current has been upgraded to Version 8.12.8. Patches have also been released for OpenBSD Versions 3.2 and 3.1. Apply patches or upgrade.
HP released fixes for Tru64 UNIX.
IBM has released a patchs AIXAPAR:IY40500, AIXAPAR:IY40501, AIXAPAR:IY40502 which address this issue.
FreeBSD released an advisory containing a security patch as well as patched binary releases. Users are advised to upgrade as soon as possible. Administrators are advised to upgrade to Version 8.12.8. Patches are available for 8.12.x, 8.11.x, 8.10.x and 8.9.x versions from SendMail's Web site.
5
|
Sendmail Address Prescan Possible Memory Corruption Vulnerability |
port 587/tcp
|
Sendmail is affected by a memory corruption condition that may or may not be remotely exploitable. The potentially exploitable flaw is present in the prescan() procedure, one that is used for processing e-mail addresses in SMTP headers. This function is implemented in the source code file "parseaddr.c".
This vulnerability is due to a logic error in the conversion of a char to an integer value. More information can be obtained from Cert Advisory - CA-2003-12.
4
|
Multiple Vendor CDE ToolTalk Database Server Null Write Vulnerability |
The ToolTalk database server is vulnerable to a condition that may allow NULL words to be written to arbitrary locations in memory. The vulnerability is due to an input validation error in the _TT_ISCLOSE procedure, used by ToolTalk clients to close open ToolTalk databases.
The _TT_ISCLOSE RPC accepts a file descriptor as a parameter. This integer value is used as an index for writing to structures in server memory. There are no checks to restrict the range of the index value. Consequently, malicious file descriptor values supplied by remote clients may cause writes to occur far beyond the table in memory. The only value written is a NULL word, limiting the consequences.
It should be noted that the only authentication required is client-supplied AUTH_UNIX credentials. AUTH_UNIX credentials may be trivially spoofed by attackers.
4
|
KCMS Directory Traversal Vulnerability |
A problem could make it possible for a remote user to gain unauthorized remote access to arbitrary files. It has been reported that a problem exists in the Kodak Color Management System (KCMS) due to the insecure handling of input. It may be possible for a remote user to gain access to arbitrary files on a vulnerable host.
This could allow remote information gathering, leakage of sensitive information, and potentially privilege elevation. The problem occurs in the KCS_OPEN_PROFILE. By exploiting a vulnerable system running the kcms_server process, it's possible for a remote user to download any file for which the kcms_server has read access. As the kcms_server process is typically executed as root, this could be any file on the target system. Note that an attacker must use the TT_ISBUILD procedure call of ToolTalk to exploit this issue.
4
|
Solaris cachefsd Denial of Service Vulnerability |
A vulnerability has been reported in the RPC server component of the Cache File System. If an RPC request for an invalid procedure is made, the daemon will crash.
Further technical details are forthcoming.
Solution: Sun has released patches to address this issue. Check the Sun Web Site for updates.
4
|
cmsd RPC Daemon Over TCP Might Indicate a Break-in |
Unauthorized users can force the "cmsd" service to bind to a TCP port by exploiting the "cmsd" buffer overflow. Then, they can try to exploit the RPC service listening on the TCP port to obtain a shell. Whether they obtain access or not, a new "cmsd" daemon will be listening on a TCP port (this new entry is registered in the portmapper list).
4
|
Sendmail check_relay Access Bypassing Vulnerability |
port 25/tcp
|
Sendmail uses a general map, which is activated by FEATURE(access_db). This is used by Sendmail to "accept", "reject" or "relay" mail from various hosts, among other actions.
A vulnerability has been discovered in Sendmail that may allow attackers to bypass access restrictions for the check_relay ruleset. Due to this vulnerability, it's possible for atackers to use bogus DNS data to bypass the access restrictions imposed by the access_db FEATURE when used with the check_relay ruleset.
Versions 8.9.0, 8.9.1, 8.9.2, 8.9.3, 8.12.1, 8.12.2, 8.12.3, 8.12.4, 8.12.5 and 8.12.6 are known to be vulnerable.
4
|
Sendmail check_relay Access Bypassing Vulnerability |
port 587/tcp
|
Sendmail uses a general map, which is activated by FEATURE(access_db). This is used by Sendmail to "accept", "reject" or "relay" mail from various hosts, among other actions.
A vulnerability has been discovered in Sendmail that may allow attackers to bypass access restrictions for the check_relay ruleset. Due to this vulnerability, it's possible for atackers to use bogus DNS data to bypass the access restrictions imposed by the access_db FEATURE when used with the check_relay ruleset.
Versions 8.9.0, 8.9.1, 8.9.2, 8.9.3, 8.12.1, 8.12.2, 8.12.3, 8.12.4, 8.12.5 and 8.12.6 are known to be vulnerable.
3
|
RWALL Spoofing |
3
|
Sun Solaris CDE ToolTalk Set Default Session Memory Corruption Vulnerability |
3
|
OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability |
port 22/tcp
|
A vulnerability has been reported for OpenSSH that may allow unauthorized access to an OpenSSH server's login mechanism. The vulnerability exists in the way OpenSSH restricts access. It's possible to configure OpenSSH to restrict access based on certain hostname or IP address patterns. When a connection is made to an OpenSSH server, a reverse DNS lookup is made to verify the hostname. Access to the login mechanism is then granted based on the lookup response.
An attacker who controls a malicious DNS server may be capable of spoofing a PTR record to mimic the hostname of an authorized user. Furthermore, by using a record containing an IP address of a trusted host, it may also be possible to bypass the access control.
3
|
Possible Mail Relay |
port 25/tcp
|
It is possible that mail relaying is allowed by the mail server on the host. More details about the specific relaying addresses that are accepted by the mail server are given in the Results section. Since a mail server that accepts a relaying address may be configured not to actually deliver the mail to that address. If this is the case, you may safely ignore this report.
3
|
Sendmail File Locking Denial of Service Vulnerability |
port 25/tcp
|
There is a vulnerability in Sendmail that may lead to a denial of service condition. The vulnerability occurs when a malicious user acquires an exclusive lock on files that Sendmail requires for operation. Sendmail uses file locking for a variety of files including aliases, maps, statistics, and the pid file. If a user has access to these files, the user may be able to obtain exclusive locks on these files. If Sendmail, or its associated programs, is unable to obtain access to any critical files, it will cease to function properly.
Sendmail Version 8.12.4 changes the existing permissions of sendmail-specific files to prevent access from unauthorized users.
3
|
Sendmail File Locking Denial of Service Vulnerability |
port 587/tcp
|
There is a vulnerability in Sendmail that may lead to a denial of service condition. The vulnerability occurs when a malicious user acquires an exclusive lock on files that Sendmail requires for operation. Sendmail uses file locking for a variety of files including aliases, maps, statistics, and the pid file. If a user has access to these files, the user may be able to obtain exclusive locks on these files. If Sendmail, or its associated programs, is unable to obtain access to any critical files, it will cease to function properly.
Sendmail Version 8.12.4 changes the existing permissions of sendmail-specific files to prevent access from unauthorized users.
3
|
Possible Mail Relay |
port 587/tcp
|
It is possible that mail relaying is allowed by the mail server on the host. More details about the specific relaying addresses that are accepted by the mail server are given in the Results section. Since a mail server that accepts a relaying address may be configured not to actually deliver the mail to that address. If this is the case, you may safely ignore this report.
2
|
rusers RPC Service Information Disclosure Vulnerability |
In the Result section, we list the connected users found, if any. We also list the TCP and/or UDP port this vulnerability is detected on.
2
|
nlockmgr RPC Service Multiple Vulnerabilities |
First, an obscure exploit has been posted in an underground ezine (crh008.zip). It seems that the RPC "nlockmgr" service is vulnerable to a buffer overflow, and could therefore allow the execution of arbitrary code on the remote host with the privileges of this daemon (usually root). Information about the vulnerable Operating System is not yet available.
Moreover, there is a denial of service vulnerability in the Linux Kernel implementation of "nlockmgr". It is possible to crash this service remotely by sending specially crafted RPC packets to the system.
2
|
Operating System Detected |
1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.
Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.
2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).
3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.
4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.
Operating System | Technique | ID |
Solaris 8 | TCP/IP Fingerprint | U1194:7 |
2
|
Host Uptime Guess Based on TCP TimeStamp Option |
Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.
2
|
Open RPC Services List |
port 111/tcp
|
program | version | protocol | port | name |
100000 | 2 | udp | 111 | rpcbind |
100000 | 4 | tcp | 111 | rpcbind |
100000 | 3 | udp | 111 | rpcbind |
100000 | 4 | udp | 111 | rpcbind |
100000 | 3 | tcp | 111 | rpcbind |
100000 | 2 | tcp | 111 | rpcbind |
100001 | 4 | udp | 32788 | rstatd |
100001 | 3 | udp | 32788 | rstatd |
100001 | 2 | udp | 32788 | rstatd |
100002 | 3 | tcp | 32772 | rusersd |
100002 | 2 | udp | 32784 | rusersd |
100002 | 3 | udp | 32784 | rusersd |
100002 | 2 | tcp | 32772 | rusersd |
100008 | 1 | udp | 32787 | walld |
100011 | 1 | udp | 32783 | rquotad |
100012 | 1 | udp | 32786 | sprayd |
100021 | 1 | tcp | 4045 | nlockmgr |
100021 | 4 | udp | 4045 | nlockmgr |
100021 | 2 | udp | 4045 | nlockmgr |
100021 | 2 | tcp | 4045 | nlockmgr |
100021 | 3 | udp | 4045 | nlockmgr |
100021 | 4 | tcp | 4045 | nlockmgr |
100021 | 1 | udp | 4045 | nlockmgr |
100021 | 3 | tcp | 4045 | nlockmgr |
100024 | 1 | tcp | 32771 | status |
100024 | 1 | udp | 32785 | status |
100068 | 3 | tcp | 32785 | cmsd |
100068 | 5 | tcp | 32785 | cmsd |
100068 | 5 | udp | 32789 | cmsd |
100068 | 2 | tcp | 32785 | cmsd |
100068 | 2 | udp | 32789 | cmsd |
100068 | 4 | tcp | 32785 | cmsd |
100068 | 3 | udp | 32789 | cmsd |
100068 | 4 | udp | 32789 | cmsd |
100083 | 1 | tcp | 32773 | ttdbserverd |
100133 | 1 | udp | 32785 | nsm addrand |
100133 | 1 | tcp | 32771 | nsm addrand |
100221 | 1 | tcp | 32774 | kcms server |
100232 | 10 | udp | 32782 | sadmind |
100235 | 1 | tcp | 32775 | cachefsd |
100249 | 1 | tcp | 32778 | snmpXdmid |
100249 | 1 | udp | 32796 | snmpXdmid |
300598 | 1 | udp | 32795 | dmispd |
300598 | 1 | tcp | 32777 | dmispd |
805306368 | 1 | tcp | 32777 | dmispd |
805306368 | 1 | udp | 32795 | dmispd |
2
|
SMTP Banner |
port 25/tcp
|
2
|
SMTP Service Detected |
port 25/tcp
|
2
|
FTP Server Banner |
port 21/tcp
|
2
|
SMTP Banner |
port 587/tcp
|
2
|
SMTP Service Detected |
port 587/tcp
|
1
|
DNS Host Name |
IP address | Host name |
XXX.XXX.XXX.XXX | demo03.treutler.de |
1
|
ICMP Replies Received |
We have sent the following types of packets to trigger the host to send us ICMP replies:
Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)
Listed in the "Result" section are the ICMP replies that we have received.
ICMP Reply Type | Triggered By | Additional Information |
Address Mask (type=18 code=0) | Address Mask Request | 255.0.0.0 |
Echo (type=0 code=0) | Echo Request | Echo Reply |
Timestamp (type=14 code=0) | Timestamp Request | 07:19:05 GMT |
Unreachable (type=3 code=2) | IP with High Protocol | Protocol Unreachable |
Unreachable (type=3 code=3) | UDP | Port Unreachable |
1
|
Traceroute |
Hops | IP | Round Trip Time | Probe |
1 | 195.154.210.158 | 2.12ms | ICMP |
2 | 212.129.22.5 | 0.42ms | ICMP |
3 | 212.129.8.17 | 43.03ms | ICMP |
4 | 212.129.8.13 | 0.60ms | ICMP |
5 | 213.200.76.193 | 0.62ms | ICMP |
6 | 213.200.81.253 | 77.58ms | ICMP |
7 | 208.173.135.177 | 83.73ms | ICMP |
8 | 204.70.192.206 | 83.92ms | ICMP |
9 | 204.70.192.149 | 157.29ms | ICMP |
10 | 208.172.147.110 | 162.98ms | ICMP |
11 | 216.34.3.66 | 157.94ms | ICMP |
12 | XXX.XXX.XXX.XXX | 158.11ms | UDP |
1
|
Target Network Information |
1
|
Internet Service Provider |
1
|
Host Names Found |
Host Name | Source |
demo03.treutler.de | FQDN |
demo03.treutler.de | RPC SAdmindD |
1
|
Host Scan Time |
The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.
1
|
Open UDP Services List |
Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.
Port | IANA Assigned Ports/Services | Description | Service Detected |
7 | echo | Echo | echo udp |
9 | discard | Discard | unknown |
13 | daytime | Daytime | daytime udp |
19 | chargen | Character Generator | chargen udp |
37 | time | Time | time udp |
111 | sunrpc | SUN Remote Procedure Call | rpc udp |
161 | snmp | SNMP | snmp |
512 | comsat | comsat | unknown |
514 | syslog | syslog | unknown |
517 | talk | like tenex link, but across | talk |
1
|
Degree of Randomness of TCP Initial Sequence Numbers |
1
|
Open TCP Services List |
Port | IANA Assigned Ports/Services | Description | Service Detected | OS On Redirected Port |
7 | echo | Echo | echo | |
9 | discard | Discard | unknown | |
13 | daytime | Daytime | daytime | |
19 | chargen | Character Generator | chargen | |
21 | ftp | File Transfer [Control] | ftp | |
22 | ssh | SSH Remote Login Protocol | ssh | |
23 | telnet | Telnet | telnet | |
25 | smtp | Simple Mail Transfer | smtp | |
37 | time | Time | time | |
79 | finger | Finger | finger | |
111 | sunrpc | SUN Remote Procedure Call | rpc | |
512 | exec | remote process execution | rsh/rexec | |
513 | login | remote login a la telnet | rlogin | |
514 | shell | cmd | rsh/rexec | |
515 | printer | spooler | lpd | |
540 | uucp | uucpd | uucp | |
587 | submission | Submission | smtp | |
898 | unknown | unknown | http | |
4045 | lockd | rpc | ||
5987 | unknown | unknown | unknown | |
6112 | dtspcd | dtspcd | dtspcd | |
7100 | font-service | X Font Service | X11 Font Service | |
32771 | sometimes-rpc5 | Sometimes an RPC port on Solaris box (rusersd) | rpc | |
32772 | sometimes-rpc7 | Sometimes an RPC port on Solaris box (status) | rpc | |
32773 | sometimes-rpc9 | Sometimes an RPC port on Solaris box (rquotad) | rpc | |
32774 | sometimes-rpc11 | Sometimes an RPC port on Solaris box (rusersd) | rpc | |
32775 | sometimes-rpc13 | Sometimes an RPC port on Solaris box (status) | rpc | |
32777 | sometimes-rpc17 | Sometimes an RPC port on Solaris box (walld) | rpc | |
32778 | sometimes-rpc19 | Sometimes an RPC port on Solaris box (rstatd) | rpc | |
32785 | unknown | unknown | rpc | |
36232 | unknown | unknown | unknown |
1
|
Host Responds to TCP SYN Packet with Other Flags On with SYN ACK |
1
|
IP ID Values Randomness |
1
|
Telnet Banner |
port 23/tcp
|
1
|
SSH daemon information retrieving |
port 22/tcp
|
SSH1 supported | yes |
Supported authentification methods for SSH1 | RSA, keyboard_interactive, password |
Supported ciphers for SSH1 | 3des, blowfish |
SSH2 supported | yes |
Supported keys exchange algorithm for SSH2 | diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1 |
Supported decryption ciphers for SSH2 | aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael-cbc@lysator.liu.se |
Supported encryption ciphers for SSH2 | aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael-cbc@lysator.liu.se |
Supported decryption mac for SSH2 | hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96 |
Supported encryption mac for SSH2 | hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96 |
Supported authentification methods for SSH2 | publickey, password, keyboard-interactive |
1
|
SSH Banner |
port 22/tcp
|
1
|
Web Server Version |
port 898/tcp
|
Server Version | Server Banner |
Tomcat/2.1 | Tomcat/2.1 |
1
|
List of Web Directories |
port 898/tcp
|
Directories |
/images/ |
/servlet/ |
1
|
HTTP method TRACE and/or TRACK Enabled |
port 898/tcp
|
The exact method(s) used are shown in the Results section.
CONFIDENTIAL AND PROPRIETARY INFORMATION. Treutler provides the TreutlerGuard Service "As Is," without any warranty of any kind. Treutler makes no warranty that the information contained in this report is complete or error-free. |