Scan Results
XX/XX/XXXX

Report Summary
Company: Treutler
User: Thomas Treutler (Manager)
Template Title: Scan Results
Active Hosts: 3
Total Hosts: 3
Scan Type: On demand
Scan Status: Finished
Scan Date: XX/XX/XXXX at XX:XX:XX
Reference: scan/XXXXXXXXXX.XXXXX  
Scanner Appliance: XXX.XXX.XXX.XXX (Scanner 3.3.43-2, Web 4.0.189-1, Vulnsigs 1.12.19-2)
Duration: 00:23:15
Default Option Profile: No
Scan Title: Reference-Scan-Treutler
Target: XXX.XXX.XXX.XXX-XXX.XXX.XXX.XXX
Options: PCIVAP (medium bandwith, no dead hosts)
Filters: Vulnerability Checks: Disabled checks, Ignored checks

Vulnerabilities Total 289
Average Security Risk  5.0
by Severity
Severity Confirmed Potential Information Gathered Total
    5 19 25 0 44
    4 11 20 0 31
    3 33 33 4 70
    2 39 7 22 68
    1 11 0 65 76
Total 113 85 91 289
5 Biggest Categories
Category Confirmed Potential Information Gathered Total
Web server 19 22 11 52
General remote services 17 11 7 35
TCP/IP 10 1 22 33
Information gathering 3 0 30 33
CGI 16 13 4 33
Total 65 47 74 186
Vulnerabilities by Severity
Operating Systems Detected
Services Detected
Vulnerabilities Total 90
Security Risk  5.0
QID:38304   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
SSH1 protocol was deprecated due to multiple vulnerabilities and design flaws. Among multiple vulnerabilities that exist in SSH protocol Version 1 are:
-a CRC32 compensation attack detector vulnerability (buffer overflow)
-an unauthorized session key recovery problem

Multiple vendors' implementations are vulnerable due to the fact that these are protocol design errors. Version 2 of the SSH protocol fixed these errors.

IMPACT:
The consequences of vulnerabilities present is SSH Version 1 include:
-SSH protected traffic compromise
-root shell access to the system running SSH server
SOLUTION:
Disable SSH1 support. See your vendor's Web site for information on how to disable SSH protocol Version 1 support. Some references are provided below:
SSH Communications Security
F-Secure
OpenSSH

Note: Do not enable SSH Version 1 Fallback since systems with upgraded versions of SSH and with Fallback Version 1 enabled are still vulnerable.

RESULT:
SSH1 supportedyes
Supported ciphers for SSH13des, blowfish
Supported authentications for SSH1RSA, keyboard_interactive, password
QID:38069   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:

OpenSSH is a secure remote access/command execution protocol.

One of the features offered by OpenSSH is the ability to implement access control based on source IP per key. This feature contains a bug that may allow for malicious users to bypass some access control and login from unauthorized hosts.

IMPACT:
By exploiting this vulnerability, it may be possible for malicious users to bypass key-based access controls.
SOLUTION:
The OpenSSH development team released an upgrade. They also released a source code patch, which you can download from the following FTP link:
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openssh-3.1.tgz
RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:38139   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server.

There are known flaws in the SSLv2 protocol. A man-in-the-middle attacker can force the communication to a less secure level and then attempt to break the weak encryption. The attacker can also truncate encrypted messages.

These flaws have been fixed in SSLv3 (or TLSv1). Most servers (including all popular web-servers, mail-servers, etc.) and clients (including Web-clients like IE, Netscape Navigator and Mozilla and mail clients) support both SSLv2 and SSLv3. However, SSLv2 is enabled by default for backward compatibility.

The following links provide more information about this vulnerability:

IMPACT:
An attacker can exploit this vulnerability to read secure communications or maliciously modify messages.
SOLUTION:
Disable SSLv2.

Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM

How to disable SSLv2 on IIS : Microsoft Knowledge Base Article - 187498

RESULT:
No results available
QID:38140   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server.

SSL encryption ciphers are classified based on encryption key length as follows:

  • HIGH - key length larger than 128 bits
  • MEDIUM - key length equal to 128 bits
  • LOW - key length smaller than 128 bits

Messages encrypted with LOW encryption ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM or HIGH strength ciphers to guarantee transaction security.

The following link provide more information about this vulnerability:

Please note that this detection only checks for weak cipher support at the SSL layer. Some servers may implement additional protection at the data layer. For example, some SSL servers and SSL proxies (such as SSL accelerators) allow cipher negotiation to complete but send back an error message and abort further communication on the secure channel. This vulnerability may not be exploitable for such configurations.

IMPACT:
An attacker can exploit this vulnerability to decrypt secure communications without authorization.
SOLUTION:
Disable support for LOW encryption ciphers.

Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM

How to Control the Ciphers for SSL and TLS on IIS
How to Restrict the Use of Certain Cryptographic Algorithms and Protocols in Schannel.dll
How to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in Internet Information Services

RESULT:
CIPHERKEY-EXCHANGEAUTHENTICATIONMACENCRYPTION(KEY-STRENGTH)GRADE
      
SSLv2 WEAK CIPHERS     
RC4-64-MD5RSARSAMD5RC4(64) LOW
      
SSLv3 WEAK CIPHERS     
EXP-RC4-MD5RSA(512)RSAMD5RC4(40) LOW
       
TLSv1 WEAK CIPHERS     
EXP-RC4-MD5RSA(512)RSAMD5RC4(40) LOW
QID:38141   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Secure Socket Layer (SSL) protocol allows for secure communication between a client and a server.

SSL encryption ciphers are classified based on the encryption key length as follows:

  • HIGH - key length larger than 128 bits
  • MEDIUM - key length equal to 128 bits
  • LOW - key length smaller than 128 bits

Messages encrypted with LOW encryption ciphers are easy to decrypt. Commercial SSL servers should only support MEDIUM or HIGH strength ciphers to guarantee transaction security. SSL servers support a LOW grade cipher even though the client supports stronger ciphers.

The following links provide more information about this vulnerability:

IMPACT:
An attacker can exploit this vulnerability to decrypt secure communications without authorization.
SOLUTION:
Disable support for LOW encryption ciphers.

Typically, for Apache/mod_ssl, httpd.conf or ssl.conf should have the following lines:
SSLProtocol -ALL +SSLv3 +TLSv1
SSLCipherSuite ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM

How to Control the Ciphers for SSL and TLS on IIS

RESULT:
CIPHERKEY-EXCHANGEAUTHENTICATIONMACENCRYPTION(KEY-STRENGTH)GRADE
      
SSLv2 SELECTED THE FOLLOWING WEAK CIPHER     
RC4-64-MD5RSARSAMD5RC4(64) LOW
      
SSLv3 SELECTED THE FOLLOWING WEAK CIPHER     
EXP1024-RC4-SHARSA(1024)RSASHA1RC4(56) LOW
       
TLSv1 SELECTED THE FOLLOWING WEAK CIPHER     
EXP1024-RC4-SHARSA(1024)RSASHA1RC4(56) LOW
QID:5001   Category:Brute Force Attack   CVE ID:CAN-2001-1013
Vendor Reference:N/A  
THREAT:
When a request for a user is made (http://your.host/~user), certain servers (such as Apache Versions 1.3.12 and 1.3.9) return a different reply depending on whether the account user exists on the host or not.

If a request is made for an account that exists on the host, a 403 error is returned. If a request is made for a non-existent account, then a 404 error is returned.

IMPACT:
Unauthorized remote users can implement brute force attacks on the Web server to guess a valid account name on the server. Even though they may be successful in obtaining a valid account, they will still have to guess the password. However, if user passwords are weak, some services may also be brute forced.
SOLUTION:
Disable the default-enabled "UserDir" directive. To do so, add the following line to the httpd.conf file:

UserDir Disabled

Apache Versions 1.3.9 and 1.3.12 are vulnerable. Other Web servers may also be vulnerable. There are currently no patches available. We strongly advise you to upgrade to a later version of Apache.

RESULT:
N. ServerAccount
root
gdm
operator
postgres
QID:12048   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Webalizer is a popular open-source Web server log file analysis program. It produces detailed Web usage reports for viewing with a standard Web browser. Usage statistics include the most visited sites, links, client demographics, search engine queries, entry URLs and exit URLs.

The scanner found a Webalizer report on the target Web site.

IMPACT:
Depending on site policy, information in Webalizer reports could be considered sensitive and not desirable for public access. Information from the reports can be used to study the business client activity of the target corporation, possibly for a social engineering attack, and could potentially even be a privacy violation for the clients of the Web site.
SOLUTION:
If the usage statistics are not meant for public access, use proper access control to control which hosts get access to this information.
RESULT:
GET /usage/index.html HTTP/1.1
Host: demo01.treutler.de
Connection: Keep-Alive

HTTP/1.1 200 OK
Date: XX.XX.XXXX
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Last-Modified: Tue, 06 Sep 2005 11:02:04 GMT
ETag: "4501ac-27bd-431d772c"
Accept-Ranges: bytes
Content-Length: 10173
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<!-- Generated by The Webalizer Ver. 2.01-06 -->
<!-- -->
<!-- Copyright 1997-2000 Bradford L. Barrett -->
<!-- (brad@mrunix.net http://www.mrunix.net) -->
<!-- -->
<!-- Distributed under the GNU GPL Version 2 -->
<!-- Full text may be found at: -->
<!-- http://www.mrunix.net/webalizer/ -->
<!-- -->
<!-- Give the power back to the programmers -->
<!-- Support the Free Software Foundation -->
<!-- (http://www.fsf.org) -->
<!-- -->
<!-- *** Generated: 06-Sep-2005 04:02 PDT *** -->

<HTML>
<HEAD>
<TITLE>Usage Statistics for demo01.treutler.de - Last 12 Months</TITLE>
</HEAD>

<BODY BGCOLOR="#E8E8E8" TEXT="#000000" LINK="#0000FF"
VLINK="#FF0000">
<H2>Usage Statistics for demo01.treutler.de</H2>
<SMALL><STRONG>
Summary Period: Last 12 Months<BR>
Generated 06-Sep-2005 04:02 PDT<BR>
</STRONG></SMALL>
<CENTER>
<HR>
<P>
<IMG SRC="usage.png" ALT="Usage summary for demo01.treutler.de" HEIGHT=256
WIDTH=512><P>
<TABLE WIDTH=600 BORDER=2 CELLSPACING=1 CELLPADDING=1>
<TR><TH HEIGHT=4></TH></TR>
<TR><TH COLSPAN=11 BGCOLOR="#C0C0C0" ALIGN=center>Summary by
Month</TH></TR>
<TR><TH HEIGHT=4></TH></TR>
<TR><TH ALIGN=left ROWSPAN=2 BGCOLOR="#C0C0C0"><FONT
SIZE="-1">Month</FONT></TH>
<TH ALIGN=center COLSPAN=4 BGCOLOR="#C0C0C0"><FONT SIZE="-1">Daily
Avg</FONT></TH>
<TH ALIGN=center COLSPAN=6 BGCOLOR="#C0C0C0"><FONT SIZE="-1">Monthly
Totals</FONT></TH></TR>
<TR><TH ALIGN=center BGCOLOR="#008040"><FONT
SIZE="-1">Hits</FONT></TH>
<TH ALIGN=center BGCOLOR="#0080FF"><FONT
SIZE="-1">Files</FONT></TH>
<TH ALIGN=center BGCOLOR="#00E0FF"><FONT
SIZE="-1">Pages</FONT></TH>
<TH ALIGN=center BGCOLOR="#FFFF00"><FONT
SIZE="-1">Visits</FONT></TH>
<TH ALIGN=center BGCOLOR="#FF8000"><FONT
SIZE="-1">Sites</FONT></TH>
<TH ALIGN=center BGCOLOR="#FF0000"><FONT
SIZE="-1">KBytes</FONT></TH>
<TH ALIGN=center BGCOLOR="#FFFF00"><FONT
SIZE="-1">Visits</FONT></TH>
<TH ALIGN=center BGCOLOR="#00E0FF"><FONT
SIZE="-1">Pages</FONT></TH>
<TH ALIGN=center BGCOLOR="#0080FF"><FONT
SIZE="-1">Files</FONT></TH>
<TH ALIGN=center BGCOLOR="#008040"><FONT
SIZE="-1">Hits</FONT></TH></TR>
<TR><TH HEIGHT=4></TH></TR>
<TR><TD NOWRAP><A HREF="usage_200509.html"><FONT
SIZE="-1">Sep 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">69845</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">2286</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">51168</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">22</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">43</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">79325</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">67</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">153506</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">6860</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">209535</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200508.html"><FONT
SIZE="-1">Aug 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">144202</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4404</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">106215</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">52</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">75</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">214932</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">210</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">424861</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">17617</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">576808</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200507.html"><FONT
SIZE="-1">Jul 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">125971</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4648</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">93080</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">85</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">44</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">49058</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">85</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">93080</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4648</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">125971</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200506.html"><FONT
SIZE="-1">Jun 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">181701</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">5007</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">134174</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">130</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">69</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">334272</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">654</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">670872</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">25038</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">908508</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200505.html"><FONT
SIZE="-1">May 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">159931</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4628</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">117546</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">121</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">37</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">178301</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">365</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">352639</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">13884</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">479794</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200504.html"><FONT
SIZE="-1">Apr 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">165744</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4891</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">121988</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">54</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">57</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">432988</FONT></TD>
QID:12154   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
AWStats is a CGI log analyzer that generates statistical reports based on HTTP, SMTP and FTP logs. It is written in Perl and is freely available for Unix, Linux and Microsoft Windows.

A remote information disclosure vulnerability reportedly affects AWStats. This issue is due to a failure of the application to properly validate access to sensitive data. The problem presents itself when the "debug" parameter with a value of "1" or "2" is included in a request that is supplied to the affected script.

IMPACT:
As a result of successful exploitation of this vulnerability, the application surrenders sensitive information. This may facilitate further attacks against the affected computer.
SOLUTION:
There are no solutions available at this time. Check AWStats' Web site for updates.
RESULT:
GET /awstats/awstats.pl?debug=1 HTTP/1.1
Host: demo01.treutler.de
Connection: Keep-Alive

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:09:45 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

Tue Sep 6 21:09:46 2005 - DEBUG 1 - Awstats - 6.0 (build 1.704) - Perl /usr/bin/perl 5.006<br
/>
Tue Sep 6 21:09:46 2005 - DEBUG 1 - HTMLOutput=main<br />
Tue Sep 6 21:09:46 2005 - DEBUG 1 - Config file read was
"/etc/awstats/awstats.demo01.treutler.de.conf" (level 1)<br />
Cache-Control: public
Last-Modified: Wed Sep 7 04:09:46 2005
Expires: Wed Sep 7 04:09:46 2005

Tue Sep 6 21:09:46 2005 - DEBUG 1 - Search an available language among HTTP_ACCEPT_LANGUAGE=<br
/>
Tue Sep 6 21:09:46 2005 - DEBUG 1 - &nbsp;&nbsp; No language defined or available. Will use
Lang=en<br />
Tue Sep 6 21:09:46 2005 - DEBUG 1 - Call to Check_Config<br />
Tue Sep 6 21:09:46 2005 - DEBUG 1 - FrameName=index<br />
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN">

<html lang='en'>
<head>
<meta name="robots" content="noindex,nofollow" />
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
<meta http-equiv="description" content="Awstats - Advanced Web Statistics for
demo01.treutler.de" />
<title>Statistics for demo01.treutler.de</title>
</head>

<frameset cols="240,*" border="0" framespacing="2"
frameborder="0">
<frame name="mainleft" src="awstats.pl?debug=1&framename=mainleft"
noresize="0" frameborder="0" />
<frame name="mainright" src="awstats.pl?debug=1&framename=mainright"
noresize="0" scrolling="YES" frameborder="0" />
<noframes><body>Your browser does not support frames.<br />
You must set AWStats UseFramesWhenCGI parameter to 0
to see your reports.<br />
</body></noframes>
</frameset>

</html>
-CR-
QID:12048   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Webalizer is a popular open-source Web server log file analysis program. It produces detailed Web usage reports for viewing with a standard Web browser. Usage statistics include the most visited sites, links, client demographics, search engine queries, entry URLs and exit URLs.

The scanner found a Webalizer report on the target Web site.

IMPACT:
Depending on site policy, information in Webalizer reports could be considered sensitive and not desirable for public access. Information from the reports can be used to study the business client activity of the target corporation, possibly for a social engineering attack, and could potentially even be a privacy violation for the clients of the Web site.
SOLUTION:
If the usage statistics are not meant for public access, use proper access control to control which hosts get access to this information.
RESULT:
GET /usage/index.html HTTP/1.1
Host: demo01.treutler.de
Connection: Keep-Alive

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:16:07 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Last-Modified: Tue, 06 Sep 2005 11:02:04 GMT
ETag: "4501ac-27bd-431d772c"
Accept-Ranges: bytes
Content-Length: 10173
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<!-- Generated by The Webalizer Ver. 2.01-06 -->
<!-- -->
<!-- Copyright 1997-2000 Bradford L. Barrett -->
<!-- (brad@mrunix.net http://www.mrunix.net) -->
<!-- -->
<!-- Distributed under the GNU GPL Version 2 -->
<!-- Full text may be found at: -->
<!-- http://www.mrunix.net/webalizer/ -->
<!-- -->
<!-- Give the power back to the programmers -->
<!-- Support the Free Software Foundation -->
<!-- (http://www.fsf.org) -->
<!-- -->
<!-- *** Generated: 06-Sep-2005 04:02 PDT *** -->

<HTML>
<HEAD>
<TITLE>Usage Statistics for demo01.treutler.de - Last 12 Months</TITLE>
</HEAD>

<BODY BGCOLOR="#E8E8E8" TEXT="#000000" LINK="#0000FF"
VLINK="#FF0000">
<H2>Usage Statistics for demo01.treutler.de</H2>
<SMALL><STRONG>
Summary Period: Last 12 Months<BR>
Generated 06-Sep-2005 04:02 PDT<BR>
</STRONG></SMALL>
<CENTER>
<HR>
<P>
<IMG SRC="usage.png" ALT="Usage summary for demo01.treutler.de" HEIGHT=256
WIDTH=512><P>
<TABLE WIDTH=600 BORDER=2 CELLSPACING=1 CELLPADDING=1>
<TR><TH HEIGHT=4></TH></TR>
<TR><TH COLSPAN=11 BGCOLOR="#C0C0C0" ALIGN=center>Summary by
Month</TH></TR>
<TR><TH HEIGHT=4></TH></TR>
<TR><TH ALIGN=left ROWSPAN=2 BGCOLOR="#C0C0C0"><FONT
SIZE="-1">Month</FONT></TH>
<TH ALIGN=center COLSPAN=4 BGCOLOR="#C0C0C0"><FONT SIZE="-1">Daily
Avg</FONT></TH>
<TH ALIGN=center COLSPAN=6 BGCOLOR="#C0C0C0"><FONT SIZE="-1">Monthly
Totals</FONT></TH></TR>
<TR><TH ALIGN=center BGCOLOR="#008040"><FONT
SIZE="-1">Hits</FONT></TH>
<TH ALIGN=center BGCOLOR="#0080FF"><FONT
SIZE="-1">Files</FONT></TH>
<TH ALIGN=center BGCOLOR="#00E0FF"><FONT
SIZE="-1">Pages</FONT></TH>
<TH ALIGN=center BGCOLOR="#FFFF00"><FONT
SIZE="-1">Visits</FONT></TH>
<TH ALIGN=center BGCOLOR="#FF8000"><FONT
SIZE="-1">Sites</FONT></TH>
<TH ALIGN=center BGCOLOR="#FF0000"><FONT
SIZE="-1">KBytes</FONT></TH>
<TH ALIGN=center BGCOLOR="#FFFF00"><FONT
SIZE="-1">Visits</FONT></TH>
<TH ALIGN=center BGCOLOR="#00E0FF"><FONT
SIZE="-1">Pages</FONT></TH>
<TH ALIGN=center BGCOLOR="#0080FF"><FONT
SIZE="-1">Files</FONT></TH>
<TH ALIGN=center BGCOLOR="#008040"><FONT
SIZE="-1">Hits</FONT></TH></TR>
<TR><TH HEIGHT=4></TH></TR>
<TR><TD NOWRAP><A HREF="usage_200509.html"><FONT
SIZE="-1">Sep 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">69845</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">2286</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">51168</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">22</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">43</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">79325</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">67</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">153506</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">6860</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">209535</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200508.html"><FONT
SIZE="-1">Aug 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">144202</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4404</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">106215</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">52</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">75</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">214932</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">210</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">424861</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">17617</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">576808</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200507.html"><FONT
SIZE="-1">Jul 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">125971</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4648</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">93080</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">85</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">44</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">49058</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">85</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">93080</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4648</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">125971</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200506.html"><FONT
SIZE="-1">Jun 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">181701</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">5007</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">134174</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">130</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">69</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">334272</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">654</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">670872</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">25038</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">908508</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200505.html"><FONT
SIZE="-1">May 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">159931</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4628</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">117546</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">121</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">37</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">178301</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">365</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">352639</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">13884</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">479794</FONT></TD></TR>
<TR><TD NOWRAP><A HREF="usage_200504.html"><FONT
SIZE="-1">Apr 2005</FONT></A></TD>
<TD ALIGN=right><FONT SIZE="-1">165744</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">4891</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">121988</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">54</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">57</FONT></TD>
<TD ALIGN=right><FONT SIZE="-1">432988</FONT></TD>
QID:12154   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
AWStats is a CGI log analyzer that generates statistical reports based on HTTP, SMTP and FTP logs. It is written in Perl and is freely available for Unix, Linux and Microsoft Windows.

A remote information disclosure vulnerability reportedly affects AWStats. This issue is due to a failure of the application to properly validate access to sensitive data. The problem presents itself when the "debug" parameter with a value of "1" or "2" is included in a request that is supplied to the affected script.

IMPACT:
As a result of successful exploitation of this vulnerability, the application surrenders sensitive information. This may facilitate further attacks against the affected computer.
SOLUTION:
There are no solutions available at this time. Check AWStats' Web site for updates.
RESULT:
GET /awstats/awstats.pl?debug=1 HTTP/1.1
Host: demo01.treutler.de
Connection: Keep-Alive

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:16:25 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

Tue Sep 6 21:16:26 2005 - DEBUG 1 - Awstats - 6.0 (build 1.704) - Perl /usr/bin/perl 5.006<br
/>
Tue Sep 6 21:16:26 2005 - DEBUG 1 - HTMLOutput=main<br />
Tue Sep 6 21:16:26 2005 - DEBUG 1 - Config file read was
"/etc/awstats/awstats.demo01.treutler.de.conf" (level 1)<br />
Cache-Control: public
Last-Modified: Wed Sep 7 04:16:26 2005
Expires: Wed Sep 7 04:16:26 2005

Tue Sep 6 21:16:26 2005 - DEBUG 1 - Search an available language among HTTP_ACCEPT_LANGUAGE=<br
/>
Tue Sep 6 21:16:26 2005 - DEBUG 1 - &nbsp;&nbsp; No language defined or available. Will use
Lang=en<br />
Tue Sep 6 21:16:26 2005 - DEBUG 1 - Call to Check_Config<br />
Tue Sep 6 21:16:26 2005 - DEBUG 1 - FrameName=index<br />
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN">

<html lang='en'>
<head>
<meta name="robots" content="noindex,nofollow" />
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
<meta http-equiv="description" content="Awstats - Advanced Web Statistics for
demo01.treutler.de" />
<title>Statistics for demo01.treutler.de</title>
</head>

<frameset cols="240,*" border="0" framespacing="2"
frameborder="0">
<frame name="mainleft" src="awstats.pl?debug=1&framename=mainleft"
noresize="0" frameborder="0" />
<frame name="mainright" src="awstats.pl?debug=1&framename=mainright"
noresize="0" scrolling="YES" frameborder="0" />
<noframes><body>Your browser does not support frames.<br />
You must set AWStats UseFramesWhenCGI parameter to 0
to see your reports.<br />
</body></noframes>
</frameset>

</html>
-CR-
QID:5001   Category:Brute Force Attack   CVE ID:CAN-2001-1013
Vendor Reference:N/A  
THREAT:
When a request for a user is made (http://your.host/~user), certain servers (such as Apache Versions 1.3.12 and 1.3.9) return a different reply depending on whether the account user exists on the host or not.

If a request is made for an account that exists on the host, a 403 error is returned. If a request is made for a non-existent account, then a 404 error is returned.

IMPACT:
Unauthorized remote users can implement brute force attacks on the Web server to guess a valid account name on the server. Even though they may be successful in obtaining a valid account, they will still have to guess the password. However, if user passwords are weak, some services may also be brute forced.
SOLUTION:
Disable the default-enabled "UserDir" directive. To do so, add the following line to the httpd.conf file:

UserDir Disabled

Apache Versions 1.3.9 and 1.3.12 are vulnerable. Other Web servers may also be vulnerable. There are currently no patches available. We strongly advise you to upgrade to a later version of Apache.

RESULT:
N. ServerAccount
root
gdm
operator
postgres
QID:45002   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This is the global system user list, which was retrieved during the scan by exploiting one or more vulnerabilities. The Treutler IDs for the vulnerabilities leading to the disclosure of these users are also given in the Result section. Each user will be displayed only once, even though it may be obtained by using different methods.
IMPACT:
These common account(s) can be used by a malicious user to break-in the system via password bruteforcing.
SOLUTION:
To prevent your host from being attacked, do one or more of the following:
  • Remove (or rename) unnecessary accounts
  • Shutdown unnecessary network services
  • Ensure the passwords to these accounts are kept secret
  • Use a firewall to restrict access to your hosts from unauthorized domains
RESULT:
User NameSource Vulnerability (TreutlerID)
root5001
gdm5001
operator5001
postgres5001
QID:82054   Category:TCP/IP   CVE ID:CAN-2004-0230
Vendor Reference:N/A  
THREAT:
TCP provides stateful communications between hosts on a network. TCP sessions are established by a three-way handshake and use random 32-bit sequence and acknowledgement numbers to ensure the validity of traffic. A vulnerability was reported that may permit TCP sequence numbers to be more easily approximated by remote attackers. This issue affects products released by multiple vendors.

The cause of the vulnerability is that affected implementations will accept TCP sequence numbers within a certain range, known as the acknowledgement range, of the expected sequence number for a packet in the session. This is determined by the TCP window size, which is negotiated during the three-way handshake for the session. Larger TCP window sizes may be set to allow for more throughput, but the larger the TCP window size, the more probable it is to guess a TCP sequence number that falls within an acceptable range. It was initially thought that guessing an acceptable sequence number was relatively difficult for most implementations given random distribution, making this type of attack impractical. However, some implementations may make it easier to successfully approximate an acceptable TCP sequence number, making these attacks possible with a number of protocols and implementations.

This is further compounded by the fact that some implementations may support the use of the TCP Window Scale Option, as described in RFC 1323, to extend the TCP window size to a maximum value of 1 billion.

This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.

There are a few factors that may present viable target implementations, such as those which depend on long-lived TCP connections, those that have known or easily guessed IP address endpoints and those implementations with easily guessed TCP source ports. It has been noted that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack, due to the use of long-lived TCP sessions and the possibility that some implementations may use the TCP Window Scale Option. As a result, this issue is likely to affect a number of routing platforms.

Another factor to consider is the relative difficulty of injecting packets into TCP sessions, as a number of receiving implementations will reassemble packets in order, dropping any duplicates. This may make some implementations more resistant to attacks than others.

It should be noted that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further.

IMPACT:
Successful exploitation of this issue could lead to denial of service attacks on the TCP based services of target hosts. Other consequences may also result, such as man-in-the-middle attacks.
SOLUTION:
Please first check the results section below for the port number on which this vulnerability was detected. If that port number is known to be used for port-forwarding, then it is the backend host that is really vulnerable.

Various implementations and products including Check Point, Cisco, Cray Inc, Hitachi, Internet Initiative Japan, Inc (IIJ), Juniper Networks, NEC, Polycom, and Yamaha are currently undergoing review. Contact the vendors to obtain more information about affected products and fixes. NISCC Advisory 236929 - Vulnerability Issues in TCP details the vendor patch status as of the time of the advisory, and identifies resolutions and workarounds.

The Internet Engineering Task Force (IETF) has developed an Internet-Draft titled Transmission Control Protocol Security Considerations that addresses this issue.

Workaround:

The following BGP-specific workaround information has been provided.

For BGP implementations that support it, the TCP MD5 Signature Option should be enabled. Passwords that the MD5 checksum is applied to should be set to strong values and changed on a regular basis.

Secure BGP configuration instructions have been provided for Cisco and Juniper at these locations:
http://www.cymru.com/Documents/secure-bgp-template.html
http://www.qorbit.net/documents/junos-bgp-template.pdf

RESULT:
Tested on port 22 with an injected SYN/RST offset by 16 bytes.
Tested on port 80 with an injected SYN/RST offset by 16 bytes.
QID:82024   Category:TCP/IP   CVE ID:CAN-2002-0510
Vendor Reference:N/A  
THREAT:
The host transmits UDP packets with a constant IP Identification field. This behavior may be exploited to discover the operating system and approximate kernel version of the vulnerable system.

Normally, the IP Identification field is intended to be a reasonably unique value, and is used to reconstruct fragmented packets. It has been reported that in some versions of the 2.4 Linux kernel IP stack implementation, UDP packets are transmitted with a constant IP Identification field of 0.

IMPACT:
By exploiting this vulnerability, a malicious user can discover the operating system and approximate kernel version of the host. This information can then be used in further attacks against the host.
SOLUTION:
We are not currently aware of any fixes for this issue.
RESULT:
IP_ID=0
QID:11   Category:RPC   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Portmapper/Rpcbind listens on port 111 and stores an updated list of registered RPC services running on the server (RPC name, version and port number). It acts as a "gateway" for clients wanting to connect to any RPC daemon.

When the portmapper/rpcbind is removed or firewalled, standard RPC client programs fail to obtain the portmapper list. However, by sending carefully crafted packets, it's possible to determine which RPC programs are listening on which port. This technique is known as direct RPC scanning. It's used to bypass portmapper/rpcbind in order to find RPC programs running on a port (TCP or UDP ports). On Linux servers, RPC services are typically listening on privileged ports (below 1024), whereas on Solaris, RPC services are on temporary ports (starting with port 32700).

IMPACT:
Unauthorized users can build a list of RPC services running on the host. If they discover vulnerable RPC services on the host, they then can exploit them.
SOLUTION:
Firewalling the portmapper port or removing the portmapper service is not sufficient to prevent unauthorized users from accessing the RPC daemons. You should remove all RPC services that are not strictly required on this host.
RESULT:
NameProgramVersionProtocolPort
portmap/rpcbind1000002tcp111
QID:38167   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, client authenticates the remote server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection.

A certificate with a past end date cannot be trusted.

IMPACT:
By exploiting this vulnerability, an attacker can launch a man-in-the-middle attack.
SOLUTION:
Please install a server certificate with valid start and end dates.
RESULT:
Certificate #0 is not valid after Apr 15 01:19:29 2004 GMT.
QID:38169   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection.

The client can trust that the Server Certificate belongs the server only if it is signed by a mutually trusted third-party Certificate Authority (CA). Self-signed certificates are created generally for testing purposes or to avoid paying third-party CAs. These should not be used on any production or critical servers.

By exploiting this vulnerability, an attacker can impersonate the server by presenting a fake self-signed certificate. If the client knows that the server does not have a trusted certificate, it will accept this spoofed certificate and communicate with the remote server.

IMPACT:
By exploiting this vulnerability, an attacker can launch a man-in-the-middle attack.
SOLUTION:
Please install a server certificate signed by a trusted third-party Certificate Authority.
RESULT:
Certificate #0 is a self signed certificate.
QID:38170   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection.

A certificate whose Subject commonName or subjectAltName does not match the server FQDN offers only encryption without authentication.

IMPACT:
A man-in-the-middle attacker can exploit this vulnerability in tandem with a DNS cache poisoning attack to lure the client to another server, and then steal all the encryption communication.
SOLUTION:
Please install a server certificate whose Subject commonName or subjectAltName matches the server FQDN.
RESULT:
Certificate #0 (localhost.localdomain) does not resolve.
QID:38173   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection. The authentication is done by verifying that the public key in the certificate is signed by a trusted third-party Certificate Authority.

If a client is unable to verify the certificate, it can abort communication or prompt the user to continue the communication without authentication.

IMPACT:
By exploiting this vulnerability, man-in-the-middle attacks in tandem with DNS cache poisoning can occur.

Exception:
If the server communicates only with a restricted set of clients who have the server certificate or the trusted CA certificate, then the server or CA certificate may not be available publicly, and the scan will be unable to verify the signature.

SOLUTION:
Please install a server certificate signed by a trusted third-party Certificate Authority.
RESULT:
Certificate #0 self signed certificate
QID:38172   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
An SSL Certificate associates an entity (person, organization, host, etc.) with a Public Key. In an SSL connection, the client authenticates the remote server using the server's Certificate and extracts the Public Key in the Certificate to establish the secure connection.

The basicConstraints section of the certificate may specify if it is a Certificate Authority (CA) certificate. Also, the keyUsage field in the X509v3 extensions section of the certificate, if present, may restrict the usage of the certificate.

In general, a server public key should not be used for Certificate or CRL signing and a client or CA certificate should be not used as a server certificate.

IMPACT:
If the keyUsage or the basicConstraint field is designated as a critical parameter in the certificate, the client may abort the communication if the usage validation fails.
SOLUTION:
Please install a server certificate with correct usage.
RESULT:
Certificate #0 is not suitable for CRL signing.
QID:38284   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Netscape's SSLv3 implementation had a bug where if a SSLv3 connection is initially established, the first available cipher is used. If a session is resumed, a different cipher may be chosen if it appears in the passed cipher list before the session's current cipher. This bug can be used to change ciphers on the server.

OpenSSL contains this bug if the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option is enabled during runtime. This option was introduced for compatibility reasons.

The problem arises when different applications using OpenSSL's libssl library enable all compatibility options including SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG, thus enabling the bug.

IMPACT:
A malicious legitimate client can enforce a ciphersuite not supported by the server to be used for a session between the client and the server. This can result in disclosure of sensitive information.
SOLUTION:
This problem can be fixed by disabling the SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG option from the options list of OpenSSL's libssl library. This can be done by replacing the SSL_OP_ALL definition in the openssl/ssl.h file with the following line:

#define SSL_OP_ALL (0x00000FFFL^SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG)

The library and all programs using this library need to be recompiled to ensure that the correct OpenSSL library is used during linking.

RESULT:
NULL-SHA:NULL-MD5:DHE-DSS-RC4-SHA:EXP1024-DHE-DSS-RC4-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EDH-DSS-DES-CB
C3-SHA:EDH-DSS-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA
QID:86473   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A Web server was detected that supports the HTTP TRACE method. This method allows debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS web server uses an alias TRACK for this method, and is functionally the same.

A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.

The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.

Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.

The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.

IMPACT:
If this vulnerability is successfully exploited, users of the Web server may lose their authentication credentials for the server and/or for the Web applications hosted by the server to an attacker. This may be the case even if the Web applications are not vulnerable to cross site scripting attacks due to input validation errors.
SOLUTION:
Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.

Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
</IfModule>
With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.

A slightly tighter fix is to use:

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$
RewriteRule .* - [F]
</IfModule>

Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.

URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.

Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.

For more details about other web servers : Cert Advisory.

RESULT:
TRACE / HTTP/1.1
Host: demo01.treutler.de
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:09:31 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http

TRACE / HTTP/1.1
Host: demo01.treutler.de
Via: <script>alert('TreutlerXSS');</script>

-CR-TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:09:32 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

QID:86473   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A Web server was detected that supports the HTTP TRACE method. This method allows debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS web server uses an alias TRACK for this method, and is functionally the same.

A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.

The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.

Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.

The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.

IMPACT:
If this vulnerability is successfully exploited, users of the Web server may lose their authentication credentials for the server and/or for the Web applications hosted by the server to an attacker. This may be the case even if the Web applications are not vulnerable to cross site scripting attacks due to input validation errors.
SOLUTION:
Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.

Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
</IfModule>
With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.

A slightly tighter fix is to use:

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$
RewriteRule .* - [F]
</IfModule>

Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.

URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.

Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.

For more details about other web servers : Cert Advisory.

RESULT:
TRACE / HTTP/1.1
Host: demo01.treutler.de
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:15:21 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http

TRACE / HTTP/1.1
Host: demo01.treutler.de
Via: <script>alert('TreutlerXSS');</script>

-CR-TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:15:22 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

QID:82003   Category:TCP/IP   CVE ID:CAN-1999-0524
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. It's principal purpose is to provide a protocol layer able to inform gateways of the inter-connectivity and accessibility of other gateways or hosts. "ping" is a well-known program for determining if a host is up or down. It uses ICMP echo packets. ICMP timestamp packets are used to synchronize clocks between hosts.
IMPACT:
Unauthorized users can obtain information about your network by sending ICMP timestamp packets. For example, the internal systems clock should not be disclosed since some internal daemons use this value to calculate ID or sequence numbers (i.e., on SunOS servers).
SOLUTION:
You can filter ICMP messages of type "Timestamp" and "Timestamp Reply" at the firewall level. Some system administrators choose to filter most types of ICMP messages for various reasons. For example, they may want to protect their internal hosts from ICMP-based Denial Of Service attacks, such as the Ping of Death or Smurf attacks.

However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) are necessary for proper behavior of Operating System TCP/IP stacks.

It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.

RESULT:
time stamp of host: 04:04:52 GMT
QID:86477   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Apache HTTP Server is a popular, open-source HTTP server for multiple platforms, including Windows, Unix, and Linux.

A cache management feature for Apache makes use of an entity tag (ETag) header. When this option is enabled and a request is made for a document relating to a file, an ETag response header is returned containing various file attributes for caching purposes. ETag information allows subsequent file requests to contain specific information, such as the file's inode number.

A weakness has been found in the generation of ETag headers under certain configurations implementing the FileETag directive. Among the file attributes included in the header is the file inode number that is returned to a client. In Apache Versions 1.3.22 and earlier, it's not possible to disable inodes in in ETag headers. In later versions, the default behavior is to release this sensitive information.

IMPACT:
This vulnerability poses a security risk, as the disclosure of inode information may aid in launching attacks against other network-based services. For instance, NFS uses inode numbers to generate file handles.
SOLUTION:
OpenBSD has released a patch that fixes this vulnerability. After installing the patch, inode numbers returned from the server are encoded using a private hash to avoid the release of sensitive information.

Customers are advised to upgrade to the latest version of Apache. In Apache Version 1.3.27 and later, it's possible to configure the FileETag directive to generate ETag headers without inode information. To do so, include "FileETag -INode" in the Apache server configuration file for a specific subdirectory.

In order to fix this vulnerability globally, for the Web server, use the option "FileETag None". Use the option "FileETag MTime Size" if you just want to remove the Inode information.

RESULT:
"41812c-b4a-3db6f019"
QID:12087   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The scanner found PHP version information in the headers returned by the PHP-enabled target Web server. This likely means that the "expose_php" variable is set to "On" in the "php.ini" configuration file for the Web server.
IMPACT:
This allows remote users to easily know that PHP is installed on the Web server. It also provides version information of the PHP installation. This could aid an attacker in launching more targeted attacks in the future.
SOLUTION:
Locate the "php.ini" configuration file on the target host and add this setting to it: "expose_php=Off". Restart the Web server.
RESULT:
HEAD / HTTP/1.1
Host: demo01.treutler.de
Connection: Keep-Alive

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:09:47 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Last-Modified: Wed, 23 Oct 2002 18:53:13 GMT
ETag: "41812c-b4a-3db6f019"
Accept-Ranges: bytes
Content-Length: 2890
Connection: close
Content-Type: text/html

QID:86477   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Apache HTTP Server is a popular, open-source HTTP server for multiple platforms, including Windows, Unix, and Linux.

A cache management feature for Apache makes use of an entity tag (ETag) header. When this option is enabled and a request is made for a document relating to a file, an ETag response header is returned containing various file attributes for caching purposes. ETag information allows subsequent file requests to contain specific information, such as the file's inode number.

A weakness has been found in the generation of ETag headers under certain configurations implementing the FileETag directive. Among the file attributes included in the header is the file inode number that is returned to a client. In Apache Versions 1.3.22 and earlier, it's not possible to disable inodes in in ETag headers. In later versions, the default behavior is to release this sensitive information.

IMPACT:
This vulnerability poses a security risk, as the disclosure of inode information may aid in launching attacks against other network-based services. For instance, NFS uses inode numbers to generate file handles.
SOLUTION:
OpenBSD has released a patch that fixes this vulnerability. After installing the patch, inode numbers returned from the server are encoded using a private hash to avoid the release of sensitive information.

Customers are advised to upgrade to the latest version of Apache. In Apache Version 1.3.27 and later, it's possible to configure the FileETag directive to generate ETag headers without inode information. To do so, include "FileETag -INode" in the Apache server configuration file for a specific subdirectory.

In order to fix this vulnerability globally, for the Web server, use the option "FileETag None". Use the option "FileETag MTime Size" if you just want to remove the Inode information.

RESULT:
"41812c-b4a-3db6f019"
QID:12087   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The scanner found PHP version information in the headers returned by the PHP-enabled target Web server. This likely means that the "expose_php" variable is set to "On" in the "php.ini" configuration file for the Web server.
IMPACT:
This allows remote users to easily know that PHP is installed on the Web server. It also provides version information of the PHP installation. This could aid an attacker in launching more targeted attacks in the future.
SOLUTION:
Locate the "php.ini" configuration file on the target host and add this setting to it: "expose_php=Off". Restart the Web server.
RESULT:
HEAD / HTTP/1.1
Host: demo01.treutler.de
Connection: Keep-Alive

HTTP/1.1 200 OK
Date: Wed, 07 Sep 2005 04:16:09 GMT
Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4
OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
Last-Modified: Wed, 23 Oct 2002 18:53:13 GMT
ETag: "41812c-b4a-3db6f019"
Accept-Ranges: bytes
Content-Length: 2890
Connection: close
Content-Type: text/html

QID:38217   Category:General remote services   CVE ID:CAN-2003-0693 CAN-2003-0695 CAN-2003-0682
Vendor Reference:N/A  
THREAT:
Multiple memory management errors have been reported in OpenSSH. These issues exist in the "buffer.c" source file, and may potentially be exploited to execute arbitrary code with the privileges of OpenSSH. The problem appears to be buffer size accounting and related issues, and could result in corruption of heap memory with attacker-supplied values.
IMPACT:
An attacker could exploit this vulnerability to launch a denial of service attack on the SSH service, or to execute arbitrary privileged code on the target.
SOLUTION:
OpenSSH 3.7.1p1 has been released to address this issue. Check the OpenSSH Advisory for the latest information.

Many vendors backport the patches to packages based on earlier versions of openssh. The following packages have been reported to address this issue:
Solaris 9 SPARC: patch 113273-04 or later
Solaris 9 x86: patch 114858-03 or later
AIX-5.2 opensshi-aix52 3.6.1p2_52
AIX-5.1 opensshi-aix51 3.6.1p2_51
HP-UX B.11.22 T1471AA_A.03.61.002_HP-UX_B.11.22_IA.depot
HP-UX B.11.11 T1471AA_A.03.61.002_HP-UX_B.11.11_32+64.depot
HP-UX B.11.00 T1471AA_A.03.61.002_HP-UX_B.11.00_32+64.depot
redhat: openssh-3.1p1-14
fedora: openssh-3.6.1p2-19
mandrake: openssh-3.6.1p2-1.1
debian: openssh-krb5_3.4p1
suse-8.2: openssh-3.5p1-106
suse-8.1, 8-0: openssh-3.4p1-214
Mac OS X 10.2.8

As a workaround, configure OpenSSH to run with privilege separation. This configuration will reduce the impact of any latent vulnerabilities.

RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:38088   Category:General remote services   CVE ID:CVE-2002-0083
Vendor Reference:RHSA-2002:043
THREAT:
OpenSSH is a freely available implementation of the SSH client-server protocol. It is distributed and maintained by the OpenSSH team. OpenSSH includes client and server software, and supports SSH and SFTP. It was initially developed for OpenBSD, but is also widely used for Linux, Solaris, and other Unix operating systems.

A vulnerability has been announced in some versions of OpenSSH. An off-by-one error exists in the channel code. It has been reported that a local user can exploit this vulnerability by connecting to a vulnerable server (valid credentials are required). Additionally, a malicious server may attack a vulnerable OpenSSH client.

IMPACT:
The successful exploitation of this vulnerability could allow a malicious user to execute arbitrary code on the vulnerable system. If a client program is exploited, this will result in code being executed as the vulnerable user, and may result in local access to the affected machine. If the server process is subverted, code will run as the root user.
SOLUTION:
The following patch was provided by the OpenSSH team:

diff -u -r1.170 -r1.171
--- channels.c 27 Feb 2002 21:23:13 -0000 1.170
+++ channels.c 4 Mar 2002 19:37:58 -0000 1.171
@@ -146,7 +146,7 @@<BR> {
Channel *c;

- if (id < 0 || id > channels_alloc) {
+ if (id < 0 || id >= channels_alloc) {
log("channel_lookup: %d: bad id", id);
return NULL;
}


Updated versions are available at the following web site : www.openssh.com

RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:38113   Category:General remote services   CVE ID:CVE-2002-0639
Vendor Reference:N/A  
THREAT:
OpenSSH is a freely available implementation of the SSH client-server protocol. It is distributed and maintained by the OpenSSH team. OpenSSH includes client and server software, and supports SSH and SFTP. It was initially developed for OpenBSD, but is also widely used for Linux, Solaris, and other Unix operating systems.

A vulnerability exists within the "challenge-response" authentication mechanism in the OpenSSH daemon (sshd). This mechanism, part of the SSH2 protocol, verifies a user's identity by generating a challenge and forcing the user to supply a number of responses.

OpenSSH supports the SKEY and BSD_AUTH authentication options. These are compile-time options. At least one of these options must be enabled before the OpenSSH binaries are compiled for the vulnerable condition to be present. OpenBSD 3.0 and later is distributed with BSD_AUTH enabled. The SKEY and BSD_AUTH options are not enabled by default in many distributions. However, if these options are explicitly enabled, that build of OpenSSH may be vulnerable.

Note: Systems running with 'ChallengeResponseAuthentication no' are not affected.

IMPACT:
It is possible for a remote user to send a specially-crafted reply that triggers an overflow. This can result in a remote denial of service attack on the OpenSSH daemon or a complete compromise. The OpenSSH daemon runs with superuser privileges, so remote attackers can gain superuser access by exploiting this vulnerability.
SOLUTION:
Upgrade to OpenSSH 3.4 and enable Privilege Separation in the SSHd daemon. You can download the new version of OpenSSH from the OpenSSH Web site. Before ugprading and using Privilege Separation, read the description below, as well as your vendor's advisory to better understand how it may affect you.

You should do something like the following to prepare the privsep preauth environment:

# mkdir /var/empty
# chown root:sys /var/empty
# chmod 755 /var/empty
# groupadd sshd
# useradd -g sshd sshd

Set the following in your '/etc/ssh/sshd_config' file:

UsePrivilegeSeparation yes
RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:86334   Category:CGI   CVE ID:CVE-2002-0081
Vendor Reference:N/A  
THREAT:
PHP is a widely deployed scripting language, designed for Web-based development and CGI programming. Mod-PHP allows for PHP scripts to be run efficiently by an Apache Web server.

PHP does not perform proper bounds checking on functions related to Form-based File Uploads in HTML (RFC1867). Specifically, this problem occurs in the functions used to decode MIME encoded files.

IMPACT:
As a result of this vulnerability being exploited, it may be possible to overrun the buffer and overwrite locations in memory with attacker-supplied instructions.

PHP is invoked through Web servers remotely. It may be possible for remote attackers to exploit this vulnerability to gain access to target systems. A vulnerable PHP interpreter module, which is available for Apache servers, is often enabled by default.

SOLUTION:
As a workaround, file uploads may be disabled in PHP versions 4.0.3 and later. This issue has been resolved in PHP 4.1.2
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:12088   Category:CGI   CVE ID:CAN-2004-0594 CAN-2004-0595
Vendor Reference:N/A  
THREAT:
PHP offers numerous functions to facilitate efficient development such as strip_tags(). The strip_tags() function aids developers in sanitizing data that is sent to a Web browser in an attempt to eliminate cross-site scripting and HTML injection vulnerabilities.

It is reported that it's possible to bypass the PHP strip_tags() function. By including ' 0' (NULL character) characters in HTML tags, it is reported that the PHP strip_tags() function will improperly leave tags in place. Although these tags are invalid HTML and are normally ignored by browsers, it is reported that Microsoft Internet Explorer and Apple Safari both discard the ' 0' (NULL) characters and interpret the tags.

This vulnerability may mean that previously presumed-safe Web applications could contain multiple cross-site scripting and HTML injection vulnerabilities when viewed by Microsoft Internet Explorer or Apple Safari.

It is reported that "magic_quotes_gpc" must be off for PHP to be vulnerable to this issue.

Various errors within PHP's memory_limit request termination (for example, when allocating Zend HashTables before proper initialization) can be exploited to execute arbitrary code by corrupting the heap (for example, supplying arbitrary HashTable destructor pointers).

Successful exploitation requires that a resource limit has been set using the "memory_limit" configuration directive.

IMPACT:
Attacker may bypass certain security functionality or compromise a vulnerable system.

By exploiting "memory_limit", attackers may execute an arbitrary code.

SOLUTION:
This vulnerability is fixed in Version 4.3.8 and later. Install the latest version, which is available for download from PHP's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86334   Category:CGI   CVE ID:CVE-2002-0081
Vendor Reference:N/A  
THREAT:
PHP is a widely deployed scripting language, designed for Web-based development and CGI programming. Mod-PHP allows for PHP scripts to be run efficiently by an Apache Web server.

PHP does not perform proper bounds checking on functions related to Form-based File Uploads in HTML (RFC1867). Specifically, this problem occurs in the functions used to decode MIME encoded files.

IMPACT:
As a result of this vulnerability being exploited, it may be possible to overrun the buffer and overwrite locations in memory with attacker-supplied instructions.

PHP is invoked through Web servers remotely. It may be possible for remote attackers to exploit this vulnerability to gain access to target systems. A vulnerable PHP interpreter module, which is available for Apache servers, is often enabled by default.

SOLUTION:
As a workaround, file uploads may be disabled in PHP versions 4.0.3 and later. This issue has been resolved in PHP 4.1.2
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:12088   Category:CGI   CVE ID:CAN-2004-0594 CAN-2004-0595
Vendor Reference:N/A  
THREAT:
PHP offers numerous functions to facilitate efficient development such as strip_tags(). The strip_tags() function aids developers in sanitizing data that is sent to a Web browser in an attempt to eliminate cross-site scripting and HTML injection vulnerabilities.

It is reported that it's possible to bypass the PHP strip_tags() function. By including ' 0' (NULL character) characters in HTML tags, it is reported that the PHP strip_tags() function will improperly leave tags in place. Although these tags are invalid HTML and are normally ignored by browsers, it is reported that Microsoft Internet Explorer and Apple Safari both discard the ' 0' (NULL) characters and interpret the tags.

This vulnerability may mean that previously presumed-safe Web applications could contain multiple cross-site scripting and HTML injection vulnerabilities when viewed by Microsoft Internet Explorer or Apple Safari.

It is reported that "magic_quotes_gpc" must be off for PHP to be vulnerable to this issue.

Various errors within PHP's memory_limit request termination (for example, when allocating Zend HashTables before proper initialization) can be exploited to execute arbitrary code by corrupting the heap (for example, supplying arbitrary HashTable destructor pointers).

Successful exploitation requires that a resource limit has been set using the "memory_limit" configuration directive.

IMPACT:
Attacker may bypass certain security functionality or compromise a vulnerable system.

By exploiting "memory_limit", attackers may execute an arbitrary code.

SOLUTION:
This vulnerability is fixed in Version 4.3.8 and later. Install the latest version, which is available for download from PHP's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:38188   Category:General remote services   CVE ID:CAN-2003-0147
Vendor Reference:N/A  
THREAT:
OpenSSL is an open-source implementation of the SSL protocol.

A side-channel attack in the OpenSSL implementation has been published in a recent paper that may ultimately result in an active adversary gaining the RSA private key of a target server. The attack involves analysis of the timing of certain operations during client-server session key negotiation.

Session negotiation occurs using the RSA PKCS 1 type public key cryptography standard. During the client-server negotiation, the client constructs a proto-session-key using PKCS 1 formatted random bytes and encrypts it with the RSA public key of the server. The client then transmits this value to the server, which uses it to compute the shared session key. The server will generate a session key on its own and send an alert message to the client if the client-supplied proto-key decrypted by the server using its RSA private key is not properly PKCS 1 formatted.

It is possible for an adversary, acting as a client, to obtain bits of information about the server RSA private key by observing the time elapsed between the transmission of an invalid proto-key value and reception of the alert message from the server that is sent in response. The information is leaked during the decryption process and may, through successive observations, reveal the factorization of the private key to the adversary. An attacker may perform this attack by repeatedly establishing sessions with invalid proto-key values.

IMPACT:
Upon successful compromise of an RSA private key, it is possible for an attacker to monitor the establishment of all future sessions with the server. This may additionally allow an attacker to impersonate the server based on the compromised private key.
SOLUTION:
This vulnerability can be fixed by enabling RSA blinding in OpenSSL. OpenSSL has provided a patch which switches blinding on by default.

This problem affects many applications using OpenSSL. In particular, almost all SSL-enabled Apaches. You should rebuild and reinstall OpenSSL, and all affected applications.

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:38118   Category:General remote services   CVE ID:CVE-2001-0872
Vendor Reference:N/A  
THREAT:
OpenSSH is a freely available implementation of the SSH client-server protocol. It is distributed and maintained by the OpenSSH team. OpenSSH includes client and server software, and supports SSH and SFTP. It was initially developed for OpenBSD, but is also widely used for Linux, Solaris, and other Unix operating systems.

A problem has been discovered in OpenSSH that could allow local users to gain elevated privileges. OpenSSH allows for certain environment variables to be set when users log in with specific keys. When the server is configured to use 'login' via the 'UseLogin' config flag, these environment variables are set for the 'login' process.

IMPACT:
This behavior could be exploited by a local malicious user to load arbitrary shared libraries for 'login' via LD_PRELOAD, resulting in the execution of arbitrary code with elevated privileges.

If the 'UseLogin' flag is set, local users can gain root privileges. UseLogin is not enabled by default.

SOLUTION:
Upgrade to OpenSSH Version 3.0.2 or later, which is available for download from the OpenSSH Web site.
RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:86637   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Apache is a freely available Web server. It is available for a variety of platforms including Unix, Linux, and Microsoft Windows.

Apache content negotiation functionality has been reported prone to a denial of service vulnerability. The issue may present itself, if an attacker has the ability to create a malicious type-map file. The attacker may craft the type-map file in a manner sufficient to cause the vulnerable server to fall into an infinite loop.

IMPACT:
Successful exploitation of this issue causes the Apache server to exponentially consume resources, effectively denying service to other legitimate system users.
SOLUTION:
Apache Version 2.0.47 and 1.3.28 addresses this issue. Upgrade to the latest version, which is available for download from Apache's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:11423   Category:CGI   CVE ID:CAN-2003-0860 CAN-2003-0861 CAN-2003-0863
Vendor Reference:N/A  
THREAT:
PHP is the Personal Home Page Web application development suite. It is available for Unix, Linux, and Microsoft platforms.

PHP released an upgrade to address multiple vulnerabilities, including integer overflow issues reported to affect PHP4 and bundled software. Vulnerable functions that were fixed include base64_encode(), bundled GD library functions, ibase_blob_get() etc. A complete list of security fixes can be found in the PHP4 ChangeLog for version 4.3.3. Exploitation of many of these issues may require third-party Web applications (that use the PHP4 web development suite) to directly accept input passed to internal functions in PHP.

IMPACT:
Exploitation of these issues have varying consequences. In particular, integer overflows and any subsequent buffer overflows or underflows caused by them have been known to be exploitable towards denial of service attacks or even remote code execution. There is no publically available exploit at this time, and the exploit will likely depend on the web application using the PHP suite.
SOLUTION:
PHP released an upgrade to address multiple vulnerabilities. You can download the upgrade from PHP's Download site at http://www.php.net/downloads.php.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86314   Category:Web server   CVE ID:CVE-2002-0082
Vendor Reference:N/A  
THREAT:
This host is running Apache server with a version of Mod_SSL, which, if not patched, is vulnerable to the buffer overflow issue described below. You can safely ignore this report if a patch has already been applied to fix this issue.

Mod_SSL is an implementation of SSL (Secure Socket Layer) for the Apache Web server. Mod_SSL contains a buffer overflow vulnerability that could allow malicious users to execute arbitrary code. The overflow exists when Mod_SSL attempts to cache an SSL session. Vulnerable versions of Mod_SSL are incapable of handling large session representations.

To exploit this vulnerability, the malicious user must somehow increase the size of the data representing the session. This can be accomplished through the use of an extremely large client certificate. However, this is only possible if verification of client certificates is enabled, and if the certificates are verified by Certificate Authorities who are trusted by the Web server.

IMPACT:
If this vulnerability is successfully exploited, malicious remote users can execute arbitrary code on the host.
SOLUTION:
Upgrade to the latest version.

Mod_SSL Upgrade

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86637   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Apache is a freely available Web server. It is available for a variety of platforms including Unix, Linux, and Microsoft Windows.

Apache content negotiation functionality has been reported prone to a denial of service vulnerability. The issue may present itself, if an attacker has the ability to create a malicious type-map file. The attacker may craft the type-map file in a manner sufficient to cause the vulnerable server to fall into an infinite loop.

IMPACT:
Successful exploitation of this issue causes the Apache server to exponentially consume resources, effectively denying service to other legitimate system users.
SOLUTION:
Apache Version 2.0.47 and 1.3.28 addresses this issue. Upgrade to the latest version, which is available for download from Apache's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:11423   Category:CGI   CVE ID:CAN-2003-0860 CAN-2003-0861 CAN-2003-0863
Vendor Reference:N/A  
THREAT:
PHP is the Personal Home Page Web application development suite. It is available for Unix, Linux, and Microsoft platforms.

PHP released an upgrade to address multiple vulnerabilities, including integer overflow issues reported to affect PHP4 and bundled software. Vulnerable functions that were fixed include base64_encode(), bundled GD library functions, ibase_blob_get() etc. A complete list of security fixes can be found in the PHP4 ChangeLog for version 4.3.3. Exploitation of many of these issues may require third-party Web applications (that use the PHP4 web development suite) to directly accept input passed to internal functions in PHP.

IMPACT:
Exploitation of these issues have varying consequences. In particular, integer overflows and any subsequent buffer overflows or underflows caused by them have been known to be exploitable towards denial of service attacks or even remote code execution. There is no publically available exploit at this time, and the exploit will likely depend on the web application using the PHP suite.
SOLUTION:
PHP released an upgrade to address multiple vulnerabilities. You can download the upgrade from PHP's Download site at http://www.php.net/downloads.php.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:38198   Category:General remote services   CVE ID:CAN-2003-0386
Vendor Reference:N/A  
THREAT:
OpenSSH is a freely available implementation of the SSH client-server protocol. It is distributed and maintained by the OpenSSH team.

A vulnerability has been reported for OpenSSH that may allow unauthorized access to an OpenSSH server's login mechanism. The vulnerability exists in the way OpenSSH restricts access. It's possible to configure OpenSSH to restrict access based on certain hostname or IP address patterns. When a connection is made to an OpenSSH server, a reverse DNS lookup is made to verify the hostname. Access to the login mechanism is then granted based on the lookup response.

An attacker who controls a malicious DNS server may be capable of spoofing a PTR record to mimic the hostname of an authorized user. Furthermore, by using a record containing an IP address of a trusted host, it may also be possible to bypass the access control.

IMPACT:
An attacker can exploit this vulnerability to access the login mechanism of a restricted OpenSSH server. Note that if a target OpenSSH server is configured to carry out key-based authentication, an attacker may be capable of gaining remote access. For this to occur, an attacker must possess a key (such as an RSA key) of a trusted OpenSSH user.
SOLUTION:
As a workaround, these options are available:
  • Enable "VerifyReverseMapping" on the sshd server. This is the vendor-recommended workaround. Note that this option may lead to slow logins when the client doesn't have a reverse DNS server.
  • Consider using tcp-wrappers to restrict access by IP address.
  • Consider using a packet filter or firewall in addition to the OpenSSH restrictions.
RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:86563   Category:Web server   CVE ID:CAN-2003-0460
Vendor Reference:N/A  
THREAT:
Apache HTTP Server is an open-source Web server designed to run on a number of different platforms.

Apache HTTP Server Version 1.3.28 was released in response to multiple vulnerabilities. Apache is vulnerable to three potential security issues. The impact of these vulnerabilities includes denial of service, file descriptor leakage, and logging failures.

Attackers may also be able to send specially crafted requests that cause Apache to go into an internal loop and eventually crash.

Under certain circumstances, Apache may leak file descriptors from a parent process to a child process. This could result in varying degrees of unauthorized access.

Under Windows and OS/2 systems, it may be possible to cause Apache to send special control characters over a pipe. This could potentially cause Apache to cease logging and exit (CAN-2003-0460).

IMPACT:
If these vulnerabilities are successfully exploited, vulnerable servers may crash, resulting in a denial of service, file descriptors may be leaked, and attackers may gain varying degrees of unauthorized access.
SOLUTION:
Upgrade to Apache HTTP Server Version 1.3.28, which was released by the Apache Software Foundation to fix these issues.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86600   Category:Web server   CVE ID:CAN-2003-0542 CAN-2003-0789
Vendor Reference:N/A  
THREAT:
Apache HTTP Server versions prior to 1.3.29 and 2.0.48 contain a vulnerability in certain modules, allowing a local attacker to trigger a buffer overflow on the system.

The vulnerability exists in the modules "mod_alias" and "mod_rewrite". These modules improperly handle regular expressions containing more than nine capturing parentheses. A local attacker could create a specially-crafted configuration file with such expressions to be used by the modules.

IMPACT:
Buffer overflow conditions may be exploited to cause a denial of service (DoS) on the server. It is not known whether this vulnerability may be exploited to execute arbitrary code.
SOLUTION:
Upgrade your server to the latest version of apache server, which is available for download from Apache's Web site.

For Apache based IBM HTTP Servers, IBM has released a cumulative patch which fixes these issues as well as a few other issues. Please visit http://www-1.ibm.com/support/docview.wss?rs=177&context=SSEQTJ&uid=swg24006719 for information and the patch.

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86680   Category:Web server   CVE ID:CAN-2004-0940 CAN-2004-0492
Vendor Reference:N/A  
THREAT:
Multiple local buffer overflow vulnerabilities have been reported for Apache Web Server.

A potential buffer overflow with escaped characters in the SSI tag string is reported. The vulnerability is caused due to a boundary error in the "get_tag()" function of the "mod_include" module. This issue can be exploited to cause a buffer overflow when a specially crafted document with malformed server-side includes is requested through an HTTP session.

Heap-based buffer overflow in "proxy_util.c" for "mod_proxy" in Apache allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

IMPACT:
A local attacker may control the process execution and may get unauthorized access.
SOLUTION:
Apache has released Apache Web Server Version 1.3.33 to address these issues. Download the latest version from Apache's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:12144   Category:CGI   CVE ID:CAN-2004-1018 CAN-2004-1019 CAN-2004-1063 CAN-2004-1064
Vendor Reference:N/A  
THREAT:
PHP is the Hypertext Preprocessor Web application development suite. It is available for Unix, Linux, and Microsoft.

PHP4 and PHP5 are reported prone to multiple remotely exploitable vulnerabilities. These issue result from insufficient sanitization of user-supplied data. A remote attacker may carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations.

The following issues were identified:

PHP4 is reported prone to a directory traversal vulnerability. It is reported that this issue arises in the default configuration, which is shipped with the "magic_quotes_gpc" directive set to "On". This setting invokes the "addslashes()" function to sanitize all user-supplied input. The issue presents itself as a NULL byte is not properly sanitized by the "addslashes()" function. This allows an attacker to bypass input restrictions and carry out directory traversal attacks by appending a NULL byte to an HTTP GET request containing "../" type directory traversal sequences.

PHP4 and PHP5 are reported prone to a vulnerability that allows an attacker to upload a file to an arbitrary location. This issue also arises when the "magic_quotes_gpc" directive set to "On". Reportedly, an attacker can upload a file to an arbitrary location by including a single quote "'" in the file name preceded by ".." type directory traversal sequences. Apparently the "addslashes()" function replaces the single quote with a back slash resulting in the file being placed in a lower level of the directory tree.

IMPACT:
If successfully exploited, the first issue may reveal sensitive files to an unauthorized remote attacker. Information gathered through exploiting this issue may aid in further attacks against the vulnerable computer.

If successfully exploited, the second issue may allow the attacker to place files in arbitrary locations. This can potentially replace existing files and lead to data corruption or other attacks.

SOLUTION:
The vendor has released updated packages to address these issues. New versions can be downloaded from www.php.net.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:10696   Category:CGI   CVE ID:CVE-2002-0185
Vendor Reference:N/A  
THREAT:
Gregory Trubetskoy's mod_python is an Apache module that allows the Web server to interpret Python scripts. mod_python supports Apache 1.3.x, and is available for Linux and most Unix systems.

An issue has been reported with the mod_python publisher, which may allow a malicious user to access any function in any module that has been included by a previously called script. This includes the standard Python libraries.

The mod_python publisher can be used to map URL information directly into a Python module and function. Path information is used to locate the appropriate module and directory, and CGI parameters are passed directly as function parameters.

At a minimum, default Python libraries will allow a malicious user to create directories on the host system. Greater risks may result from additional modules or third-party code, which may be called in an unintended manner. For example, a database wrapper module may not perform authentication checking on the assumption that it would not be called by an untrusted source.

Exploitation of this vulnerability requires that a script has been previously imported. Reportedly, this is done on a per child process basis under Apache. As a result, exploitation may be sensitive to the ability to access the same child process multiple times.

IMPACT:
If successfully exploited, a malicious user can access any function in any module that has been included by a previously called script.
SOLUTION:
A new version can be obtained from the mod_python Web site.

Workaround: Including the following line at the top of sensitive modules will prevent direct access:

__auth__ = {}
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:12158   Category:CGI   CVE ID:CAN-2005-0525
Vendor Reference:N/A  
THREAT:
A remote denial of service vulnerability affects PHP Group PHP. This issue is due to a failure of the application to properly handle maliciously crafted JPEG image files.

The problem presents itself when the affected application attempts to parse a maliciously crafted JPEG file. This occurs due to a failure to properly validate image header data in the "php_handle_jpeg()" function defined in "ext/standard/image.c" prior to using it to control loop iteration.

Apparently, when a file contains an invalid marker value the process can be forced into an infinite loop. The application will read an invalid marker, determine that it is invalid, and call the "php_skip_variable()" function to bypass it. If the marker causes the "php_skip_variable()" function to read to the end of the JPEG file, flawed file stream pointer manipulation will cause the file stream pointer to be placed two bytes from the end of the file. When the application attempts to read the next marker, it finds it to be invalid, and the process repeats, triggering an infinite loop. Note that this vulnerability can only be exploited remotely if a Web-based PHP application allows user-supplied images to be processed by the "getimagesize()" function. This function is commonly implemented in PHP Web applications that allow the display of images.

IMPACT:
An attacker may leverage this issue to cause the affected script interpreter to consume excessive processing resources on an affected computer, leading to a denial of service condition.
SOLUTION:
The vendor has released an upgrade dealing with this issue.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86563   Category:Web server   CVE ID:CAN-2003-0460
Vendor Reference:N/A  
THREAT:
Apache HTTP Server is an open-source Web server designed to run on a number of different platforms.

Apache HTTP Server Version 1.3.28 was released in response to multiple vulnerabilities. Apache is vulnerable to three potential security issues. The impact of these vulnerabilities includes denial of service, file descriptor leakage, and logging failures.

Attackers may also be able to send specially crafted requests that cause Apache to go into an internal loop and eventually crash.

Under certain circumstances, Apache may leak file descriptors from a parent process to a child process. This could result in varying degrees of unauthorized access.

Under Windows and OS/2 systems, it may be possible to cause Apache to send special control characters over a pipe. This could potentially cause Apache to cease logging and exit (CAN-2003-0460).

IMPACT:
If these vulnerabilities are successfully exploited, vulnerable servers may crash, resulting in a denial of service, file descriptors may be leaked, and attackers may gain varying degrees of unauthorized access.
SOLUTION:
Upgrade to Apache HTTP Server Version 1.3.28, which was released by the Apache Software Foundation to fix these issues.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86600   Category:Web server   CVE ID:CAN-2003-0542 CAN-2003-0789
Vendor Reference:N/A  
THREAT:
Apache HTTP Server versions prior to 1.3.29 and 2.0.48 contain a vulnerability in certain modules, allowing a local attacker to trigger a buffer overflow on the system.

The vulnerability exists in the modules "mod_alias" and "mod_rewrite". These modules improperly handle regular expressions containing more than nine capturing parentheses. A local attacker could create a specially-crafted configuration file with such expressions to be used by the modules.

IMPACT:
Buffer overflow conditions may be exploited to cause a denial of service (DoS) on the server. It is not known whether this vulnerability may be exploited to execute arbitrary code.
SOLUTION:
Upgrade your server to the latest version of apache server, which is available for download from Apache's Web site.

For Apache based IBM HTTP Servers, IBM has released a cumulative patch which fixes these issues as well as a few other issues. Please visit http://www-1.ibm.com/support/docview.wss?rs=177&context=SSEQTJ&uid=swg24006719 for information and the patch.

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86680   Category:Web server   CVE ID:CAN-2004-0940 CAN-2004-0492
Vendor Reference:N/A  
THREAT:
Multiple local buffer overflow vulnerabilities have been reported for Apache Web Server.

A potential buffer overflow with escaped characters in the SSI tag string is reported. The vulnerability is caused due to a boundary error in the "get_tag()" function of the "mod_include" module. This issue can be exploited to cause a buffer overflow when a specially crafted document with malformed server-side includes is requested through an HTTP session.

Heap-based buffer overflow in "proxy_util.c" for "mod_proxy" in Apache allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

IMPACT:
A local attacker may control the process execution and may get unauthorized access.
SOLUTION:
Apache has released Apache Web Server Version 1.3.33 to address these issues. Download the latest version from Apache's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86695   Category:Web server   CVE ID:CAN-2004-0700
Vendor Reference:N/A  
THREAT:
mod_ssl provides an interface for accessing the OpenSSL libraries from within Apache and providing strong cryptography for the Apache web server.

mod_ssl is affected by a format string vulnerability within its logging function. This issue is due to a failure of the application to properly implement a formatted string function. The problem is reported to present itself due to an improperly implemented call to the "ssl_log()" function. Apparently, user input is provided as the format string to the affected function, facilitating attacker control of format specifiers. The offending call is located within the "mod_proxy" hook functions. It is currently not known where the user input is derived.

IMPACT:
As a result of this issue, malicious log entries containing format specifiers will be interpreted literally when logs are written. This may result in attacker-specified memory being corrupted or disclosed, leading to arbitrary code execution.
SOLUTION:
The vendor has released an upgrade dealing with this issue. You can get more information about the upgrade from http://www.modssl.org/.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:12144   Category:CGI   CVE ID:CAN-2004-1018 CAN-2004-1019 CAN-2004-1063 CAN-2004-1064
Vendor Reference:N/A  
THREAT:
PHP is the Hypertext Preprocessor Web application development suite. It is available for Unix, Linux, and Microsoft.

PHP4 and PHP5 are reported prone to multiple remotely exploitable vulnerabilities. These issue result from insufficient sanitization of user-supplied data. A remote attacker may carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations.

The following issues were identified:

PHP4 is reported prone to a directory traversal vulnerability. It is reported that this issue arises in the default configuration, which is shipped with the "magic_quotes_gpc" directive set to "On". This setting invokes the "addslashes()" function to sanitize all user-supplied input. The issue presents itself as a NULL byte is not properly sanitized by the "addslashes()" function. This allows an attacker to bypass input restrictions and carry out directory traversal attacks by appending a NULL byte to an HTTP GET request containing "../" type directory traversal sequences.

PHP4 and PHP5 are reported prone to a vulnerability that allows an attacker to upload a file to an arbitrary location. This issue also arises when the "magic_quotes_gpc" directive set to "On". Reportedly, an attacker can upload a file to an arbitrary location by including a single quote "'" in the file name preceded by ".." type directory traversal sequences. Apparently the "addslashes()" function replaces the single quote with a back slash resulting in the file being placed in a lower level of the directory tree.

IMPACT:
If successfully exploited, the first issue may reveal sensitive files to an unauthorized remote attacker. Information gathered through exploiting this issue may aid in further attacks against the vulnerable computer.

If successfully exploited, the second issue may allow the attacker to place files in arbitrary locations. This can potentially replace existing files and lead to data corruption or other attacks.

SOLUTION:
The vendor has released updated packages to address these issues. New versions can be downloaded from www.php.net.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:10696   Category:CGI   CVE ID:CVE-2002-0185
Vendor Reference:N/A  
THREAT:
Gregory Trubetskoy's mod_python is an Apache module that allows the Web server to interpret Python scripts. mod_python supports Apache 1.3.x, and is available for Linux and most Unix systems.

An issue has been reported with the mod_python publisher, which may allow a malicious user to access any function in any module that has been included by a previously called script. This includes the standard Python libraries.

The mod_python publisher can be used to map URL information directly into a Python module and function. Path information is used to locate the appropriate module and directory, and CGI parameters are passed directly as function parameters.

At a minimum, default Python libraries will allow a malicious user to create directories on the host system. Greater risks may result from additional modules or third-party code, which may be called in an unintended manner. For example, a database wrapper module may not perform authentication checking on the assumption that it would not be called by an untrusted source.

Exploitation of this vulnerability requires that a script has been previously imported. Reportedly, this is done on a per child process basis under Apache. As a result, exploitation may be sensitive to the ability to access the same child process multiple times.

IMPACT:
If successfully exploited, a malicious user can access any function in any module that has been included by a previously called script.
SOLUTION:
A new version can be obtained from the mod_python Web site.

Workaround: Including the following line at the top of sensitive modules will prevent direct access:

__auth__ = {}
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:12158   Category:CGI   CVE ID:CAN-2005-0525
Vendor Reference:N/A  
THREAT:
A remote denial of service vulnerability affects PHP Group PHP. This issue is due to a failure of the application to properly handle maliciously crafted JPEG image files.

The problem presents itself when the affected application attempts to parse a maliciously crafted JPEG file. This occurs due to a failure to properly validate image header data in the "php_handle_jpeg()" function defined in "ext/standard/image.c" prior to using it to control loop iteration.

Apparently, when a file contains an invalid marker value the process can be forced into an infinite loop. The application will read an invalid marker, determine that it is invalid, and call the "php_skip_variable()" function to bypass it. If the marker causes the "php_skip_variable()" function to read to the end of the JPEG file, flawed file stream pointer manipulation will cause the file stream pointer to be placed two bytes from the end of the file. When the application attempts to read the next marker, it finds it to be invalid, and the process repeats, triggering an infinite loop. Note that this vulnerability can only be exploited remotely if a Web-based PHP application allows user-supplied images to be processed by the "getimagesize()" function. This function is commonly implemented in PHP Web applications that allow the display of images.

IMPACT:
An attacker may leverage this issue to cause the affected script interpreter to consume excessive processing resources on an affected computer, leading to a denial of service condition.
SOLUTION:
The vendor has released an upgrade dealing with this issue.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:38186   Category:General remote services   CVE ID:CAN-2003-0078
Vendor Reference:N/A  
THREAT:
OpenSSL is an open-source implementation of the SSL protocol.

A side-channel attack against some implementations of SSL exists that, through analysis of the timing of certain operations, can reveal sensitive information to an active adversary.

The weakness in the OpenSSL implementation is that it did not compute message authentication codes for packets with invalid block cipher padding. By analyzing the time it takes for the server to transmit an error response to ciphertext blocks injected into a session by an attacker, adversaries could feasibly infer whether the block error is due to invalid block cipher padding or invalid MAC.

The OpenSSL development team has reduced the information leakage by calculating MACs for packets with invalid block cipher padding in Version 0.9.6i and 0.9.7a. It is not known if other implementations are vulnerable to this or similar weaknesses.

IMPACT:
It has been reported that the information leaked by vulnerable implementations is sufficient for an adaptive attack that will ultimately obtain plaintext of a target block of ciphertext. It should be noted that this attack is difficult to exploit and requires that the adversary be a man-in-the-middle.
SOLUTION:
This vulnerability is fixed in OpenSSL Version 0.9.6i and 0.9.7a. Upgrade to the latest version, which is available for download from OpenSSL's Web site.
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:38258   Category:General remote services   CVE ID:CAN-2004-0081
Vendor Reference:N/A  
THREAT:
OpenSSL contains a vulnerability that causes it to improperly handle unknown message types. An unauthenticated, remote malicious user could cause an application using OpenSSL to enter an infinite loop, which will result in a denial of service condition.

This vulnerability was addressed in OpenSSL Versions 0.9.6d and 0.9.7.

IMPACT:
If this vulnerability is successfully exploited, applications using OpenSSL will enter an infinite loop and a denial of service condition will occur.
SOLUTION:
This vulnerability was fixed in OpenSSL Versions 0.9.6d and 0.9.7. You can download the latest version of OpenSSL from ftp://ftp.openssl.org/source/ or from an FTP mirror at http://www.openssl.org/source/mirror.html.

Any application dynamically linked to OpenSSL libraries should be restarted after applying fixes. Applications that are statically linked to OpenSSL libraries should be recompiled after upgrading OpenSSL.

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86704   Category:Web server   CVE ID:CAN-2005-1344
Vendor Reference:USN-120-1
THREAT:
Apache is a freely available, open source Web server software package. It is distributed and maintained by the Apache Group.

A buffer overflow vulnerability exists in the "htdigest" utility included with Apache. The vulnerability is due to improper bounds checking when copying user-supplied realm data into local buffers.

By supplying an overly long realm value to command line options of "htdigest", it's possible to trigger an overflow condition. This may cause memory to be corrupted with attacker-specified values.

IMPACT:
Since the program is not setuid, this vulnerability does not have a local impact.

However, this may be an issue if "htdigest" is called from a CGI script. An attacker may be able to supply malformed data to the program which will cause the overflow to occur.

SOLUTION:
Ubuntu has released an advisory (USN-120-1) and fixes to address this and another issue. See the referenced advisory for further information.

Workaround:
Exposure to this and other security issues may be reduced if administrators avoid situations that require "htdigest" to be called from a CGI script.

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86632   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Apache is a freely available, open source Web server software package. It is distributed and maintained by the Apache Group. Mod_PHP is an Apache module which allows for PHP functionality in Web sites.

A weakness has been reported to exist in the Apache mod_php module that may allow remote attackers to disclose sensitive information by influencing global variables. The issue reportedly presents itself when the php.ini configuration file has the parameter setting "register_globals = on".

IMPACT:
If a request is made to a virtual host which has the setting "php_admin_flag register_globals off" and another request is made to a different virtual host which does not have the setting "php_admin_flag register_globals off", the original setting may continue to exist. This issue could lead to other vulnerabilities, such as PHP file include, due to an attacker's ability to influence global variables. An attacker may also be able to disclose sensitive information in order to gain unauthorized access.
SOLUTION:
Gentoo has released an advisory to address this issue. See the referenced advisory for more information. Gentoo users may carry out the following commands to update their software:
emerge sync
emerge -pv ">=dev-php/mod_php-4.3.4-r4"
emerge ">=dev-php/mod_php-4.3.4-r4"
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86704   Category:Web server   CVE ID:CAN-2005-1344
Vendor Reference:USN-120-1
THREAT:
Apache is a freely available, open source Web server software package. It is distributed and maintained by the Apache Group.

A buffer overflow vulnerability exists in the "htdigest" utility included with Apache. The vulnerability is due to improper bounds checking when copying user-supplied realm data into local buffers.

By supplying an overly long realm value to command line options of "htdigest", it's possible to trigger an overflow condition. This may cause memory to be corrupted with attacker-specified values.

IMPACT:
Since the program is not setuid, this vulnerability does not have a local impact.

However, this may be an issue if "htdigest" is called from a CGI script. An attacker may be able to supply malformed data to the program which will cause the overflow to occur.

SOLUTION:
Ubuntu has released an advisory (USN-120-1) and fixes to address this and another issue. See the referenced advisory for further information.

Workaround:
Exposure to this and other security issues may be reduced if administrators avoid situations that require "htdigest" to be called from a CGI script.

RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:86632   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Apache is a freely available, open source Web server software package. It is distributed and maintained by the Apache Group. Mod_PHP is an Apache module which allows for PHP functionality in Web sites.

A weakness has been reported to exist in the Apache mod_php module that may allow remote attackers to disclose sensitive information by influencing global variables. The issue reportedly presents itself when the php.ini configuration file has the parameter setting "register_globals = on".

IMPACT:
If a request is made to a virtual host which has the setting "php_admin_flag register_globals off" and another request is made to a different virtual host which does not have the setting "php_admin_flag register_globals off", the original setting may continue to exist. This issue could lead to other vulnerabilities, such as PHP file include, due to an attacker's ability to influence global variables. An attacker may also be able to disclose sensitive information in order to gain unauthorized access.
SOLUTION:
Gentoo has released an advisory to address this issue. See the referenced advisory for more information. Gentoo users may carry out the following commands to update their software:
emerge sync
emerge -pv ">=dev-php/mod_php-4.3.4-r4"
emerge ">=dev-php/mod_php-4.3.4-r4"
RESULT:
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b
DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:45017   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Several different techniques can be used to identify the operating system (OS) running on a host. A short description of these techniques is provided below. The specific technique used to identify the OS on this host is included in the RESULTS section of your report.

1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.

Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.

2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).

3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.

4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Operating SystemTechniqueID
Linux 2.4-2.6TCP/IP FingerprintU1117:22
QID:82063   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the Result section below.

Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Based on TCP timestamps obtained via port 22, the host's uptime is 258 days, 9 hours, and 58
minutes.
The TCP timestamps from the host are in units of 10 milliseconds.
QID:9   Category:RPC   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A port scanner was used to draw a map of all the RPC services accessible from the Internet.
IMPACT:
Unauthorized users can subsequently test vulnerabilities related to each of the services open.
SOLUTION:
Shut down any unknown or unused service on the list. To remove all RPC services, you cannot simply filter port 111 at the firewall because port 111 (the "portmap" service) only shows which ports the RPC services are listening on. Therefore, it cannot block access to these services. Disable the RPC services at the server level because each listens on an ephemeral UDP or TCP port.
RESULT:
programversionprotocolportname
1000002udp111rpcbind
1000002tcp111rpcbind
QID:12059   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server was probed for various URL-encoding schemes that it supports.

Per this paper by Daniel Roelker that was presented at Defcon 11, popular Web servers like Microsoft IIS support a variety of encoding schemes for the URLs. These include Percent-escaped Hex Encoding, Double-percent Escaped Hex Encoding, Microsoft's %U Encoding, Percent-escaped 2-Byte UTF-8 Encoding, and Raw 2-Byte UTF-8 Encoding.

For a sample HTTP GET request, GET /. HTTP/1.0, the following illustrates the encoded URI under these schemes:

Percent-escaped Hex Encoding: GET /%2e HTTP/1.0
Double-percent Escaped Hex Encoding: GET /%252e HTTP/1.0
Percent-escaped 2-Byte UTF-8 Encoding: GET /%C0%AE HTTP/1.0
Raw 2-Byte UTF-8 Encoding: GET /\xC0\xAE HTTP/1.0 (Actual raw 0xC0 and 0xAE bytes)
Microsoft's %U Encoding: GET /%u002e HTTP/1.0

The supported encoding schemes are listed in the Results section.

URI encoding is relevant to Web server security since, as mentioned in the paper above, attackers could launch HTTP attacks while at the same time obfuscating the URIs to evade detection by Intrusion Detection Systems that are not capable of decoding the URIs.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Single-%-Escaped Hex-Encoding Supported
QID:12059   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server was probed for various URL-encoding schemes that it supports.

Per this paper by Daniel Roelker that was presented at Defcon 11, popular Web servers like Microsoft IIS support a variety of encoding schemes for the URLs. These include Percent-escaped Hex Encoding, Double-percent Escaped Hex Encoding, Microsoft's %U Encoding, Percent-escaped 2-Byte UTF-8 Encoding, and Raw 2-Byte UTF-8 Encoding.

For a sample HTTP GET request, GET /. HTTP/1.0, the following illustrates the encoded URI under these schemes:

Percent-escaped Hex Encoding: GET /%2e HTTP/1.0
Double-percent Escaped Hex Encoding: GET /%252e HTTP/1.0
Percent-escaped 2-Byte UTF-8 Encoding: GET /%C0%AE HTTP/1.0
Raw 2-Byte UTF-8 Encoding: GET /\xC0\xAE HTTP/1.0 (Actual raw 0xC0 and 0xAE bytes)
Microsoft's %U Encoding: GET /%u002e HTTP/1.0

The supported encoding schemes are listed in the Results section.

URI encoding is relevant to Web server security since, as mentioned in the paper above, attackers could launch HTTP attacks while at the same time obfuscating the URIs to evade detection by Intrusion Detection Systems that are not capable of decoding the URIs.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Single-%-Escaped Hex-Encoding Supported
QID:6   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The host name of this computer was obtained from a DNS server.
RESULT:
IP addressHost name
XXX.XXX.XXX.XXXdemo01.treutler.de
QID:82040   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.

We have sent the following types of packets to trigger the host to send us ICMP replies:

Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)

Listed in the "Result" section are the ICMP replies that we have received.

RESULT:
ICMP Reply TypeTriggered ByAdditional Information
Echo (type=0 code=0)Echo RequestEcho Reply
Timestamp (type=14 code=0)Timestamp Request04:04:52 GMT
Unreachable (type=3 code=3)UDPPort Unreachable
QID:45006   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in between.
RESULT:
HopsIPRound Trip TimeProbe
1195.154.210.1581.82msICMP
2212.129.22.50.44msICMP
3212.129.8.171.59msICMP
4212.129.8.130.63msICMP
5213.200.76.1930.63msICMP
6213.200.81.25377.58msICMP
7208.173.135.17783.66msICMP
8204.70.192.21483.55msICMP
9204.70.192.114162.58msICMP
10208.172.147.110157.76msICMP
11216.34.3.83163.16msICMP
12XXX.XXX.XXX.XXX157.87msUDP
QID:45004   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This information was gathered using WHOIS service for the target network. Note that this is not all the information that WHOIS service provides.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may help in launching attacks against it.
RESULT:
The network handle is: NET-64-41-128-0-1
Network description:
Savvis
SAVVI-2
QID:45005   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This information was gathered using the WHOIS service for the network and is believed to be the ISP of the target network.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may aid in launching further attacks against it.
RESULT:
The ISP network handle is: NET-204-70-0-0-1
ISP Network description:
Savvis
SAVVI-3
QID:45039   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The following host names were discovered for this computer using various methods such as DNS look up, NetBIOS query, and SQL server name query.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Host NameSource
demo01.treutler.deFQDN
QID:45038   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan Time for this host is reported in the Result section below.

The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Scan duration: 1194 seconds
QID:82045   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of difficulty for exploitation of the TCP ISN generation scheme used by the host.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Average change between subsequent TCP initial sequence numbers is 4382651 with a standard deviation
of 3187826. These TCP initial sequence numbers were triggered by TCP SYN probes sent to the host at
an average rate of 1/(9978 microseconds). The degree of difficulty to exploit the TCP initial
sequence number generation scheme is: hard.
QID:82023   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site.
RESULT:
PortIANA Assigned Ports/ServicesDescriptionService DetectedOS On Redirected Port
22sshSSH Remote Login Protocolssh  
80wwwWorld Wide Web HTTPhttp  
111sunrpcSUN Remote Procedure Callrpc  
443httpshttp protocol over TLS/SSLhttp over ssl 
QID:82004   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.

Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site.
RESULT:
PortIANA Assigned Ports/ServicesDescriptionService Detected
111sunrpcSUN Remote Procedure Callrpc udp
QID:82053   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The host responds to a TCP SYN packet with at least one of the following flags set with a SYN ACK packet: RST, FIN, ACK, FIN|PSH.
IMPACT:
This behavior in the TCP/IP implementation may allow a remote user to potentially bypass a firewall protecting the host, as some (especially stateless) firewalls may be configured to allow all TCP packets with one of these flags set (RST, FIN, ACK, FIN|PSH) to go through without examining the packets' SYN flag.
SOLUTION:
Many operating systems are known to have this behavior.
RESULT:
Host responded to the following TCP probes to port 22 with SYN+ACK:
SYN+RST
SYN+FIN
SYN+FIN+PSH
QID:82046   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many operating systems, these changes reflect the network load of the host at the time this test was conducted.
RESULT:
IP ID changes observed (network order) for port 22: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0
Duration: 307 milli seconds
QID:38047   Category:General remote services   CVE ID:CAN-1999-0634
Vendor Reference:N/A  
THREAT:
N/A
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
SSH1 supportedyes
Supported authentification methods for SSH1RSA, keyboard_interactive, password
Supported ciphers for SSH13des, blowfish
SSH2 supportedyes
Supported keys exchange algorithm for SSH2diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1
Supported decryption ciphers for SSH2aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael128-cbc, rijndael192-cbc, rijndael256-cbc, rijndael-cbc@lysator.liu.se
Supported encryption ciphers for SSH2aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael128-cbc, rijndael192-cbc, rijndael256-cbc, rijndael-cbc@lysator.liu.se
Supported decryption mac for SSH2hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
Supported encryption mac for SSH2hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
Supported authentification methods for SSH2publickey, password, keyboard-interactive
QID:38050   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
SSH-1.99-OpenSSH_2.9p2
QID:86002   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
NAMEVALUE
(0)CERTIFICATE 0 
(0)Version3 (0x2)
(0)Serial Number0 (0x0)
(0)Signature Algorithmmd5WithRSAEncryption
(0)ISSUER NAME 
countryName--
stateOrProvinceNameSomeState
localityNameSomeCity
organizationNameSomeOrganization
organizationalUnitNameSomeOrganizationalUnit
commonNamelocalhost.localdomain
emailAddressroot@localhost.localdomain
(0)SUBJECT NAME 
countryName--
stateOrProvinceNameSomeState
localityNameSomeCity
organizationNameSomeOrganization
organizationalUnitNameSomeOrganizationalUnit
commonNamelocalhost.localdomain
emailAddressroot@localhost.localdomain
(0)Valid FromApr 16 01:19:29 2003 GMT
(0)Valid TillApr 15 01:19:29 2004 GMT
(0)Public Key AlgorithmrsaEncryption
(0)RSA Public Key(1024 bit)
(0) Modulus (1024 bit):
(0) 00:d4:ea:e8:ee:40:fe:32:2d:f5:b7:1d:e4:de:f7:
(0) 0a:2e:30:11:54:21:d3:db:0a:88:2c:10:7c:76:d1:
(0) 3d:ba:b1:71:22:06:01:9c:e7:95:0b:96:c6:cb:94:
(0) dd:42:c3:9a:bc:21:46:b9:b4:2d:f7:18:a7:39:1b:
(0) da:2d:51:50:10:1d:7d:62:93:ab:68:c3:59:fe:27:
(0) ae:10:79:8a:9d:ea:8f:36:c9:93:f2:18:b4:e6:2c:
(0) f3:cc:5c:c3:16:e6:fd:b5:a2:85:09:6a:27:92:eb:
(0) 32:c0:fa:98:9a:b8:dd:2b:0e:c8:d1:78:eb:55:af:
(0) 43:19:f1:4b:52:53:8f:1c:0b
(0) Exponent: 65537 (0x10001)
(0)X509v3 EXTENSIONS 
(0)X509v3 Subject Key Identifier E2:83:2D:DB:A6:D5:EA:6D:29:97:7D:B6:9A:28:87:A5:EB:40:7F:B3
(0)X509v3 Authority Key Identifier keyid:E2:83:2D:DB:A6:D5:EA:6D:29:97:7D:B6:9A:28:87:A5:EB:40:7F:B3
(0) DirName:/C=--/ST=SomeState/L=SomeCity/O=SomeOrganization/OU=SomeOrganizationalUnit/CN=localhost.localdomain/Email=root@localhost.localdomain
(0) serial:00
(0)X509v3 Basic Constraints CA:TRUE
(0)Signature(128 octets)
(0) 05:98:76:3d:b1:09:1a:d7:1d:dc:4d:b1:33:d6:66:4e
(0) 8a:de:07:ac:13:5b:bf:93:d3:3e:d1:93:2c:0b:3a:2b
(0) 15:ea:aa:2f:0e:79:9c:45:fb:62:d1:6e:b1:6b:8d:f4
(0) 53:8f:8b:ce:15:42:33:09:fe:bf:6b:7e:28:d7:f1:b7
(0) 79:5a:d6:31:a4:59:52:1a:9f:cc:a2:65:fe:86:6e:1d
(0) bf:c9:7b:a9:45:46:f1:7f:3e:df:ad:31:db:05:ed:bc
(0) 9b:4b:19:ea:92:7f:87:a8:7c:9e:88:fb:b6:e2:f0:3e
(0) a4:0d:9a:45:db:5e:a3:ca:cd:31:bf:d4:2b:f5:a5:0c
QID:38116   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:

The following is a list of supported SSL ciphers. Note: If a cipher is included in this list it means that it was possible to establish a SSL connection using that cipher. There are some web servers setups that allow connections to be established using a LOW grade cipher, only to provide a web page stating that the URL is accessible only through a non-LOW grade cipher. In this case even though LOW grade cipher will be listed here QID 38140 will not be reported.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
CIPHERKEY-EXCHANGEAUTHENTICATIONMACENCRYPTION(KEY-STRENGTH)GRADE
      
SSLv2 PROTOCOL IS ENABLED     
DES-CBC3-MD5RSARSAMD53DES(168) HIGH
RC4-MD5RSARSAMD5RC4(128) MEDIUM
RC2-CBC-MD5RSARSAMD5RC2(128) MEDIUM
EXP-RC4-MD5RSA(512)RSAMD5RC4(40) LOW
EXP-RC2-CBC-MD5RSA(512)RSAMD5RC2(40) LOW
DES-CBC-MD5RSARSAMD5DES(56) LOW
RC4-64-MD5RSARSAMD5RC4(64) LOW
      
SSLv3 PROTOCOL IS ENABLED     
DES-CBC3-MD5RSARSAMD53DES(168) HIGH
RC4-MD5RSARSAMD5RC4(128) MEDIUM
RC2-CBC-MD5RSARSAMD5RC2(128) MEDIUM
EXP-RC4-MD5RSA(512)RSAMD5RC4(40) LOW
EXP-RC2-CBC-MD5RSA(512)RSAMD5RC2(40) LOW
DES-CBC-MD5RSARSAMD5DES(56) LOW
RC4-64-MD5RSARSAMD5RC4(64) LOW
EXP1024-RC4-SHARSA(1024)RSASHA1RC4(56) LOW
EXP1024-DES-CBC-SHARSA(1024)RSASHA1DES(56) LOW
EXP1024-RC2-CBC-MD5RSA(1024)RSAMD5RC2(56) LOW
EXP1024-RC4-MD5RSA(1024)RSAMD5RC4(56) LOW
EDH-RSA-DES-CBC3-SHADHRSASHA13DES(168) HIGH
EDH-RSA-DES-CBC-SHADHRSASHA1DES(56) LOW
EXP-EDH-RSA-DES-CBC-SHADH(512)RSASHA1DES(40) LOW
DES-CBC3-SHARSARSASHA13DES(168) HIGH
DES-CBC-SHARSARSASHA1DES(56) LOW
EXP-DES-CBC-SHARSA(512)RSASHA1DES(40) LOW
RC4-SHARSARSASHA1RC4(128) MEDIUM
       
TLSv1 PROTOCOL IS ENABLED     
DES-CBC3-MD5RSARSAMD53DES(168) HIGH
RC4-MD5RSARSAMD5RC4(128) MEDIUM
RC2-CBC-MD5RSARSAMD5RC2(128) MEDIUM
EXP-RC4-MD5RSA(512)RSAMD5RC4(40) LOW
EXP-RC2-CBC-MD5RSA(512)RSAMD5RC2(40) LOW
DES-CBC-MD5RSARSAMD5DES(56) LOW
RC4-64-MD5RSARSAMD5RC4(64) LOW
EXP1024-RC4-SHARSA(1024)RSASHA1RC4(56) LOW
EXP1024-DES-CBC-SHARSA(1024)RSASHA1DES(56) LOW
EXP1024-RC2-CBC-MD5RSA(1024)RSAMD5RC2(56) LOW
EXP1024-RC4-MD5RSA(1024)RSAMD5RC4(56) LOW
EDH-RSA-DES-CBC3-SHADHRSASHA13DES(168) HIGH
EDH-RSA-DES-CBC-SHADHRSASHA1DES(56) LOW
EXP-EDH-RSA-DES-CBC-SHADH(512)RSASHA1DES(40) LOW
DES-CBC3-SHARSARSASHA13DES(168) HIGH
DES-CBC-SHARSARSASHA1DES(56) LOW
EXP-DES-CBC-SHARSA(512)RSASHA1DES(40) LOW
RC4-SHARSARSASHA1RC4(128) MEDIUM
QID:38291   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
SSL session is a collection of security parameters that are negotiated by the SSL client and server for each SSL connection. SSL session caching is targeted to reduce the overhead of negotiations in recurring SSL connections. SSL sessions can be reused to resume an earlier connection or to establish multiple simultaneous connections. The client suggests an SSL session to be reused by identifying the session with a Session-ID during SSL handshake. If the server finds it appropriate to reuse the session, then they both proceed to secure communication with already known security parameters.

This test determines if SSL session caching is enabled on the host.

IMPACT:
SSL session caching is part of the SSL and TLS protocols and is not a security threat. The result of this test is for informational purposes only.
RESULT:
SSLv3 session caching is enabled on the target.TLSv1 session caching is enabled on the target.
QID:86672   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Based largely on the HTTP reply code, the following directories are most likely present on the host.
RESULT:
Directories
/cgi-bin/
/doc/
/usage/
/mrtg/
/awstats/
/manual/
QID:86000   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
Server VersionServer Banner
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:45033   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server supports the TRACE and/or TRACK HTTP methods. These methods allow debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS Web server uses an alias TRACK for the TRACE method, and is functionally the same.

The exact method(s) used are shown in the Results section.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
TRACE method enabled on / directory
QID:86672   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Based largely on the HTTP reply code, the following directories are most likely present on the host.
RESULT:
Directories
/cgi-bin/
/doc/
/usage/
/mrtg/
/awstats/
/manual/
QID:86001   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
Server VersionServer Banner
Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_python/2.7.6 Python/1.5.2 mod_ssl/2.8.4 OpenSSL/0.9.6b DAV/1.0.2 PHP/4.0.6 mod_perl/1.24_01 mod_throttle/3.1.2
QID:45033   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server supports the TRACE and/or TRACK HTTP methods. These methods allow debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS Web server uses an alias TRACK for the TRACE method, and is functionally the same.

The exact method(s) used are shown in the Results section.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
TRACE method enabled on / directory
Vulnerabilities Total 119
Security Risk  5.0
QID:19070   Category:Database   CVE ID:CAN-2002-0649
Vendor Reference:N/A  
THREAT:
Your MS-SQL 8.0 server is NOT patched for the slammer worm buffer overflow vulnerability.

This vulnerability allows for the execution of arbitrary code on the SQL Server computer due to a stack buffer overflow. Once the worm compromises a machine, it will try to propagate itself. The worm will craft packets of 376 bytes and send them to randomly chosen IP addresses on port 1434/udp. If the packet is sent to a vulnerable machine, this machine will become infected and will also begin to propagate. Beyond the scanning activity for new hosts, the current variant of this worm has no other payload.

Activity of this worm is readily identifiable on a network by the presence of 376-byte UDP packets. These packets appear to be originating from seemingly random IP addresses and destined for port 1434/udp.

IMPACT:
Compromise by the worm confirms that a system is vulnerable to allowing a remote attacker to execute arbitrary code as the local SYSTEM user. Subsequently, it's possible for the attacker to leverage a local privilege escalation exploit in order to gain Administrator access to the vulnerable system.

The high volume of 1434/udp traffic generated by hosts infected with the worm trying to find and compromise other SQL Server computers may itself lead to performance issues (including possible denial-of-service conditions) for Internet-connected hosts or for those computers on networks with compromised hosts.

SOLUTION:
Microsoft has released a patch to address this issue. Check MS02-039 for updates.

Note: The patch released with this bulletin is effective in protecting SQL Server 2000 and MSDE 2000 against the "SQL Slammer" worm virus. However, this patch has been superseded by the patch released with MS02-061 which contains fixes for additional security vulnerabilities in these products. Microsoft recommends that SQL 2000 and MSDE 2000 customers apply the patch from MS02-061.

RESULT:
No results available
QID:90267   Category:Windows   CVE ID:CAN-2005-1983
Vendor Reference:MS05-039
THREAT:
The target Microsoft Windows system is missing the security update described in Microsoft Security Bulletin MS05-039. This update resolves a remote code execution vulnerability in the Plug and Play component of the operating system.
IMPACT:
A remote attacker could take complete control of the system.
SOLUTION:
Refer to Microsoft Security Bulletin MS05-039 for more details and instructions on downloading and installing the patch.

Note that named pipe access to the Plug and Play functions is restricted to authenticated users under Windows XP and 2003. Windows 2000 allows NULL session access to this interface by default, allowing the scanner to detect this vulnerability without login credentials.

Microsoft has categorized this update as Critical.

RESULT:
Found through SMB Transact.
THREAT:
A security update for multiple vulnerabilities on Microsoft Windows systems is available for download from Microsoft security bulletin MS04-011. The 14 vulnerabilities addressed in the security update include:

LSASS Remote Code Execution Vulnerability - CAN-2003-0533 (Windows 2000, XP, 2003 are affected)

LDAP Denial Of Service Vulnerability - CAN-2003-0663 (Windows NT, 2000, XP are affected)

PCT Remote Code Execution Vulnerability - CAN-2003-0719 (Windows NT, 2000, XP, 2003 are affected)

Winlogon Remote Code Execution Vulnerability - CAN-2003-0806 (Windows NT, 2000, XP are affected)

Metafile Remote Code Execution Vulnerability - CAN-2003-0906 (Windows NT, 2000, XP are affected)

Help and Support Center Remote Code Execution Vulnerability - CAN-2003-0907 (Windows XP, 2003 are affected)

Utility Manager Privilege Elevation Vulnerability - CAN-2003-0908 (Windows 2000 is affected)

Windows Management Privilege Elevation Vulnerability - CAN-2003-0909 (Windows XP is affected)

Local Descriptor Table Privilege Elevation Vulnerability - CAN-2003-0910 (Windows NT, 2000 are affected)

H.323 Remote Code Execution Vulnerability - CAN-2004-0117 (Windows 98, 98 SE, ME, 2000, XP, 2003 are affected)

Virtual DOS Machine Privilege Elevation Vulnerability - CAN-2004-0118 (Windows NT, 2000 are affected)

Negotiate SSP Remote Code Execution Vulnerability - CAN-2004-0119 (Windows 2000, XP, 2003 are affected)

SSL Denial Of Service Vulnerability - CAN-2004-0120 (Windows 2000, XP, 2003 are affected)

ASN.1 Double Free Remote Code Execution Vulnerability - CAN-2004-0123 (Windows NT, 2000, XP, 2003 are affected)

IMPACT:
An attacker who successfully exploits the most severe of these vulnerabilities could take complete control of an affected system. The attacker may take many actions including installing programs, viewing data, changing data, deleting data, and creating new accounts that have full privileges.
SOLUTION:
Read Microsoft security bulletin MS04-011 for information about the vulnerabilities addressed in the security update and instructions for downloading the update.
RESULT:
Detected through CIFS over NetBIOS (CAN-2003-0818).
Detected through CIFS over NetBIOS (CAN-2004-0123).
Detected through CIFS over TCP (CAN-2003-0818).
Detected through CIFS over TCP (CAN-2004-0123).
Detected through SMTP (CAN-2003-0818).
Detected through HTTP (CAN-2003-0818).
QID:90103   Category:Windows   CVE ID:CAN-2003-0818
Vendor Reference:MS04-007
THREAT:
Microsoft Windows Abstract Syntax Notation 1 (ASN.1) Library (MSASN1.dll) is shipped as a part of the Microsoft Windows Operating System. The MSASN1 library provides an application programmer's interface into Microsoft ASN.1 encoding/decoding and processing functions.

The library MSASN1.dll has been reported to be prone to an integer handling vulnerability. The issue is reported to exist because an integer value that is contained as a part of ASN.1 based communications (certificates) is interpreted as an unsigned integer type. Therefore, potentially malicious values for this integer, for example a signed value of -1(0xffffffff), may trigger unexpected behavior. Because this integer value is trusted, assumed to be unsigned, and conjectured to be further employed in potentially sensitive computations (most likely boundary checking procedures), memory corruption may result.

Note that because ASN.1 data will likely be encoded, for example Kerberos, SSL, IPSec or Base64 encoded, the malicious integer values may be obfuscated and as a result may not be easily detectable.

IMPACT:
An attacker may potentially leverage this condition to corrupt sensitive process memory with attacker-controlled addresses. This may ultimately result in the execution of arbitrary instructions. Code execution would occur in the context of the application that is linked to the vulnerable library.
SOLUTION:
Microsoft has released a security update to address this issue in affected versions of Microsoft Windows. For information about this security update and for download instructions, read Microsoft security bulletin MS04-007.
This security bulletin has been superceeded by Microsoft security bulletin MS04-011.
RESULT:
Detected through CIFS over NetBIOS (CAN-2003-0818).
Detected through CIFS over TCP (CAN-2003-0818).
Detected through SMTP (CAN-2003-0818).
QID:90221   Category:Windows   CVE ID:CAN-2005-0050
Vendor Reference:MS05-010
THREAT:
The Microsoft Windows License Logging Service allows administrators to manage licenses for Microsoft Windows servers using the Server Client Access License (CAL) model.

A remote buffer overflow vulnerability exists in the License Logging Service that could result in arbitrary code execution or a denial of service. Any user that is able to connect to the ports used by the service (139 and 445) can exploit this vulnerability. Arbitrary code would be executed with System privileges.

On Windows NT 4.0 with any service pack level and Windows 2000 Service Pack 1, 2, and 3, any anonymous user that can connect to the ports could exploit this vulnerability.

On Windows 2000 Service Pack 4 and Windows 2003 only authenticated users can exploit this vulnerability.

This service is installed and running by default on Windows NT 4.0 servers, Windows 2000 servers, and Windows Small Business Server 2000 and 2003. The service is installed but not running by default on Windows Server 2003.

On Windows 2003 servers, the vulnerability can only be exploited to cause a denial of service.

IMPACT:
An attacker can potentially cause denial of service and also run arbitrary code on a vulnerable system.
SOLUTION:
Refer to Microsoft security bulletin MS05-010 for more details and instructions on installing the patch.
RESULT:
No results available
QID:90252   Category:Windows   CVE ID:CAN-2005-1206
Vendor Reference:MS05-027
THREAT:
A remote code execution vulnerability exists in Server Message Block (SMB) that could allow an attacker who successfully exploits this vulnerability to take complete control of the affected system.
IMPACT:
A remote attacker could exploit this vulnerability to execute arbitrary code and take complete control of the affected system.
SOLUTION:
Read Microsoft Security Bulletin MS05-027 for more information on this vulnerability and instructions on installing the patch.

Note that Windows NT Workstations and Servers are also vulnerable to this issue. The above security bulletin does not offer a patch for Windows NT systems because, according to Microsoft, they have "reached the end of their life cycles". Please contact Microsoft for additional support periods for Windows NT.

RESULT:
Found through SMB Transact.
QID:90086   Category:Database   CVE ID:CAN-2003-0230 CAN-2003-0231 CAN-2003-0232
Vendor Reference:MS03-031
THREAT:
Multiple vulnerabilities are present on the Microsoft SQL Server installed on the target, including the following: LPC port request buffer overflow vulnerability, Named Pipe denial of service vulnerability, and Named Pipe hijacking vulnerability.

Local Procedure Calls (LPC) provide a mechanism for interprocess communications on some Microsoft platforms. Each LPC utilizes a collection of communication ports to allow for information exchange between the client and the server. Microsoft SQL Server is prone to a buffer overflow in the mechanism that accepts LPC port requests. If a specifically malformed message is received by the LPC port, stack memory may be overwritten due to insufficient bounds checking.

Microsoft SQL Server and the Microsoft Data Engine have been reported prone to a Named Pipe denial of service attack. Any local or remote user, who can authenticate and is part of the Everyone Group, may trigger a denial of service condition in an affected SQL Server. It has been reported that if a remote attacker sends an unusually large request to a named pipe, the SQL Server will become unresponsive.

Microsoft SQL Server and the Microsoft Data Engine have been reported prone to a privilege escalation vulnerability via named pipes. A named pipe is a conduit for interprocess communication that is identified by a specific name; it is used to pass information between a pipe server and its clients. It has been reported that a named pipe, used to control certain connection attempts to the SQL server, is prone to a vulnerability that may provide escalation of privileges. The issue presents itself within the checking routines for the affected pipe. Under certain circumstances, specifically during the authentication procedure, a local attacker may seize control of the named pipe.

IMPACT:
Successful exploitation of the LPC Port request buffer overrun vulnerability would allow an attacker to execute code with the privilege level of the SQL Server process. Under most conditions, exploitation would only allow an attacker to gain full access to the SQL database. However, if the SQL Server is running as Administrator or Local System, exploitation would allow for full system compromise. It's important to note that an attacker must be authenticated to the SQL Server in order to exploit this vulnerability.

The impact of the denial of service vulnerability may vary between service packs and versions. It has been reported that on SQL Server 2000 without Service Pack 3 installed, the service will crash and must be restarted to restore normal operations. However, on SQL Server 2000 with Service Pack 3 applied, this is not the case. The service does not appear to crash but does not process requests received post-attack. It has also been reported that it's not possible to stop the affected service, and the system will require a reboot to restore normal operations.

If the Named Pipe hijacking vulnerability is successfully exploited, the attacker may thereby inherit the permissions of the user who is attempting to connect to the SQL server via the compromised pipe.

SOLUTION:
Microsoft has released patches to address the issue. Check Microsoft Security Bulletin MS03-031 for the latest information on these vulnerabilities.
RESULT:
8.0.196
QID:86170   Category:Web server   CVE ID:CVE-2001-0500
Vendor Reference:MS01-033
THREAT:

Microsoft Index Server and Indexing Service enables text searches on an Internet or Intranet site via a Web browser. Index Server ships with Windows NT 4.0 Option Pack and Indexing Service ships with Windows 2000.

An unchecked buffer exists in a certain ISAPI extension associated with the Index Server and Indexing Service. A host running Microsoft Index Server or Indexing Service is susceptible to the execution of arbitrary code due to an unchecked buffer in the 'idq.dll' ISAPI extension. If a request is made in a particular manner to a host with 'idq.dll' installed, either Index Server or Indexing Service will experience a buffer overflow and allow the execution of arbitrary code. Unfortunately, the Index Server and Indexing Service runs in the Local System context; therefore, the attacker can specify arbitrary code to be run with Local System privileges.

'idq.dll' provides support for Internet Data Administration (.ida) files and Internet Data Query (.idq) files. In order to exploit this vulnerability, script mappings that associate '.idq' and '.ida' files with 'idq.dll' must exist.

It should be noted that Index Server and Indexing Service do not need to be running in order for an attacker to exploit this issue. 'idq.dll' is installed by default when IIS is installed, subsequently IIS would need to be the only service running.

IMPACT:
Successful exploitation of this vulnerability could lead to a complete compromise of the target host.
SOLUTION:
Microsoft released the following patches to address this issue:
RESULT:
HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:20:24 GMT
Connection: close
Content-Type: text/html

<HTML>The IDQ file NULL.ida could not be found.
QID:86140   Category:Web server   CVE ID:CVE-2001-0333
Vendor Reference:N/A  
THREAT:

When loading an executable CGI program, Microsoft Internet Information Server (IIS) decodes the CGI filename twice. First, IIS checks the CGI filename to see if it's an executable file. (For example, IIS might do a suffix check-up to see if there's a '.exe' or '.com' extension.) Then, IIS performs a second decode process. This process would typically only apply to the CGI parameters; however, IIS mistakenly decodes both the CGI parameters and the already decoded CGI filename. Thus, the CGI filename is decoded twice.

With a malformed CGI filename, a malicious user can get around the IIS filename security check-ups, such as the '../' or './' check-ups.

In some cases, a malicious user may be able to run arbitrary system commands.

IMPACT:
If this vulnerability is successfully exploited, then a malicious user may be able to execute arbitrary commands using the user account the Web server is running under (typically the IUSER_machinename account).
SOLUTION:
Microsoft issued a patch. For more information, refer to Microsoft Security Bulletin MS01-026.
RESULT:
Volume in drive C has no label.
Volume Serial Number is 7816-F348
06/13/2002 05:31p <DIR> .
06/13/2002 05:31p <DIR> ..
02/09/2000 09:39p 15,760 NSIISLOG.DLL
QID:86255   Category:Web server   CVE ID:CVE-2000-0770
Vendor Reference:MS00-057
THREAT:
Due to an error in canonicalization affecting CGI scripts and ISAPI extensions, incorrect permissions may be set for a given file on a Web server following a malformed HTTP request. This will allow a user to perform actions on CGI or ISAPI-mapped files, including reading or executing, which would normally be denied. This does not apply to files in virtual folders. The correct file is located, but is concluded to be in a location different from its actual folder. Depending on the exact nature of the malformed URL, the file may inherit the permissions of any parent folder in the file's path.
IMPACT:
If successfully exploited, a malicious user may be able to perform actions on CGI or ISAPI-mapped files, including reading or executing, which would normally be denied.
SOLUTION:
Microsoft released patches for Microsoft IIS Versions 4.0 and 5.0. For instructions on how to retrieve and apply the patches, refer to Microsoft's Security Bulletin MS00-057.

It was reported that the above Security Bulletin does not contain a valid link for the patch. Alternative links for the patch are: http://www.microsoft.com/ntserver/nts/downloads/critical/q269862 for Microsoft IIS Version 4.0 and http://www.microsoft.com/windows2000/downloads/critical/q269862 for Microsoft IIS Version 5.0.

RESULT:
No results available
QID:86215   Category:Web server   CVE ID:CVE-2000-0884
Vendor Reference:N/A  
THREAT:
Microsoft IIS Versions 4.0 and 5.0 are both vulnerable to double dot "../" directory traversal exploitation if extended UNICODE character representations are used in substitution for "/" and "".
IMPACT:
If successfully exploited, unauthorized users can access any known file in the context of the IUSR_machinename account. The IUSR_machinename account is a member of the Everyone and Users groups by default, therefore, any file on the same logical drive as the web root that is accessible to these groups can be deleted, modified, or executed. Successful exploitation would provide unauthorized remote users with the same privileges authorized system users.

This vulnerability is also used by the sadmind/IIS Worm. For more information about this worm, read CERT Advisory CA-2001-11.

SOLUTION:
The patch released with Micrsoft security bulletin MS00-057 eliminates this vulnerability. Therefore, if you've already applied the patch, you do not have to take any further action. Otherwise, the patch is available at the following locations:

Microsoft IIS Version 4.0: http://www.microsoft.com/ntserver/nts/downloads/critical/q269862

Microsoft IIS Version 5.0: http://www.microsoft.com/windows2000/downloads/critical/q269862

RESULT:
Volume in drive C has no label.
Volume Serial Number is 7816-F348
06/13/2002 05:31p <DIR> .
06/13/2002 05:31p <DIR> ..
02/09/2000 09:39p 15,760 NSIISLOG.DLL
QID:86250   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:

Microsoft's Internet Information Server (IIS) is vulnerable to a UTF directory traversal, which could allow an attacker to execute commands remotely on the target server.

Normally, IIS blocks attempts to access directories outside of the Web root in HTTP requests. If 'directory traversal' character sequences that try to do this are found in an HTTP request, IIS blocks the request. However, if special UTF encoding is used, this filtering is bypassed, allowing an attacker to traverse outside of the Web root and execute commands on the system.

Remote Web clients may access any known file in the context of the IUSR_machinename account. The IUSR_machinename account is a member of the 'Everyone' and 'Users' groups by default. Therefore, any file on the same logical drive as any Web-accessible file that is accessible to these groups can be deleted, modified, or executed.

It is believed that exploitation of this vulnerability requires the presence of an executable 'scripts'-type virtual folder. Removal of these folders could mitigate this vulnerability. However, Microsoft has not verified that. It is important to note that remote command execution vulnerabilities similar to this were used by the Code Red, Code Blue, and Nimda worms. It should be expected that a worm could exploit this vulnerability to propagate itself. Additional technical details are forthcoming.

IMPACT:
If successfully exploited, unauthorized users can access any known file in the context of the IUSR_machinename account. The IUSR_machinename account is a member of the 'Everyone' and 'Users' groups by default. Therefore, any file on the same logical drive as the Web root accessible to these groups can be deleted, modified, or executed. Successful exploitation of this vulnerability would provide unauthorized remote users the same privileges as authorized system users.
SOLUTION:

Microsoft released patches for IIS Versions 4.0 and 5.0. For more information about this vulnerability, and for information on how to retrieve and apply the patches, refer to Microsoft Security Bulletin MS00-057.

You can get the IIS Version 4.0 patch from the following location:
http://www.microsoft.com/ntserver/nts/downloads/critical/q269862

You can get the IIS Version 5.0 patch from the following location:
http://www.microsoft.com/windows2000/downloads/critical/q269862

RESULT:
Volume in drive C has no label.
Volume Serial Number is 7816-F348
06/13/2002 05:31p <DIR> .
06/13/2002 05:31p <DIR> ..
02/09/2000 09:39p 15,760 NSIISLOG.DLL
QID:86479   Category:Web server   CVE ID:CAN-2003-0109
Vendor Reference:MS03-007
THREAT:
There is a buffer overflow vulnerability in the "ntdll.dll" core system component of Microsoft Windows NT, 2000, and XP platforms.

The original attack vector exploited in the wild used the WebDAV (World Wide Web Distributed Authoring and Versioning) service provided by IIS 5.0 on Windows 2000. This was possible because WebDAV itself doesn't perform sufficient boundary checks on certain supplied data.

Even if the WebDAV component isn't present, such as on Windows NT/XP (by default), the underlying vulnerability will still remain in the ntdll.dll component if the system is not patched. At present, no attack vectors are known that can exploit this vulnerability on NT and XP platforms. However, applying the patch for these platforms is recommended.

IMPACT:
This vulnerability can be exploited by an attacker to cause a denial of service or even execute arbitrary code on the vulnerable machine with Local System privileges.
SOLUTION:
A solution and workarounds are available in Microsoft Security Bulletin MS03-007.
RESULT:
No results available
QID:86558   Category:Web server   CVE ID:CAN-2003-0349
Vendor Reference:MS03-022
THREAT:
Microsoft Media Services includes functionality for providing streaming media content to clients from IIS. It ships with a number of Microsoft Windows 2000 server releases and is also available for download for Windows NT.

Microsoft has reported a buffer overflow vulnerability in Windows Media Services. This is due to a problem with how the logging ISAPI extension (nsiislog.dll) handles incoming client requests. The logging facility may attempt to write excessive data to an undersized buffer when handling a malformed HTTP client request. This could trigger a denial of service or remote arbitrary code execution in IIS, which is exploitable through Media Services. The issue would occur in servers that are configured to provide logging of media requests.

IMPACT:
Any attacker-supplied code could be executed in the security context of the underlying IIS server.
SOLUTION:
A patch was made available for Windows 2000 and Windows 2000 Service Pack 3. This patch is available through Microsoft Security Bulletin MS03-022.
RESULT:
No results available
QID:19094   Category:Database   CVE ID:N/A  
Vendor Reference:KB 300516
THREAT:
The host is missing SQL Server 2000 Service Pack 1.
IMPACT:
Microsoft SQL Server Service Pack 1 contains several security fixes.
SOLUTION:
Refer to the SQL Server version 2000 Service Pack 1 Readme for details.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:19096   Category:Database   CVE ID:N/A  
Vendor Reference:KB 300516
THREAT:
Microsoft SQL Server 2000 Service Pack 2 not installed on the host.
IMPACT:
SQL Server 2000 Service Pack 2 fixes several security holes which can be exploited by malicious users.
SOLUTION:
Refer to the SQL Server version 2000 Service Pack 2 Readme for details.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:19099   Category:Database   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Microsoft SQL Server 2000 Service Pack 3 is not installed on the host.
IMPACT:
Microsoft SQL Server 2000 Service Pack 3 fixes several security holes, which may be exploited by malicious users.
SOLUTION:
Refer to the Microsoft Service Packs for SQL Server Downloads page for instructions on downloading and installing the service pack.
RESULT:
8.0.196
QID:19124   Category:Database   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Microsoft SQL Server / MSDE 2000 host is missing Service Pack 4.
IMPACT:
SQL Server 2000 Service Pack 4 includes all security hotfixes released after the release of Service Pack 3.
SOLUTION:
Read Microsoft article KB290211 for details on downloading SQL Server 2000 Service Pack 4.
RESULT:
8.0.196
QID:45003   Category:Information gathering   CVE ID:CVE-2000-1200
Vendor Reference:N/A  
THREAT:
A null session connection to the IPC$ share was successful. NetBIOS access can be obtained with any authenticated account on this host. Therefore unauthorized users can steal the remote user list. This kind of attack is commonly exploited by users with weak passwords, such as the GUEST account.
IMPACT:
By exploiting this vulnerability, unauthorized users can launch brute force password attacks and other intrusive attacks based on collected information. Employee, customer, and partner information may be gathered. Spamming the user list is also possible.
SOLUTION:
It is recommended that you disable null sessions. Read this Microsoft document called How to Use the RestrictAnonymous Registry Value for more information.

For Windows NT, setting this registry value limits only certain interfaces to this data. It is not possible to completely eliminate this vulnerability through a registry setting.

There is another interesting Microsoft document called Local Policies about Windows security policies settings for local policies.

Windows XP onwards Microsoft has added more granular control to the anonymous user access by adding couple of more DWORD registry values in the same key location as RestrictAnonymous, RestrictAnonymousSAM and EveryoneIncludesAnonymous. Set RestrictAnonymous = 1 to restrict share information access, RestrictAnonymousSAM = 1 to prevent enumeration of SAM accounts (User Accounts) and EveryoneIncludesAnonymous = 0 to prevent null-sessions from having any rights.

For Samba servers there is no direct way of disabling null session access. A workaround is may be to specify a non exisiting UNIX account in global section of Samba config file.
guest account = NON EXISTING USER.

If possible, filter out Microsoft networking ports such as TCP ports 135, 137, 138, 139, and UDP ports 135, 137, 138.

Note: Please be aware that changing the restrictanonymous setting to the highest security level for example restrictanonymous = 2 in windows 2000 may disable older programs that make use of this account. It will also affect Windows NT 4.0 Domain Controllers from communicating with each other between trust relationships.

RESULT:
Administrator
Guest
IUSR_DEMO02
IWAM_DEMO02
NetShowServices
scanner
TsInternetUser
QID:70003   Category:SMB / NETBIOS   CVE ID:CAN-1999-0519
Vendor Reference:N/A  
THREAT:
Unauthorized users can connect to this NetBIOS service without a password.
IMPACT:
Unauthorized users may be able to exploit this vulnerability to obtain sensitive information about your system resources, such as a list of all accounts or shared resources on this host. For Windows hosts, unauthorized users may also be able to access the registry, and depending on the Windows version and registry permission settings, make modifications to the registry.
SOLUTION:
Null NetBIOS sessions can be disabled using the following methods:

Windows NT:

1. Set the following registry key: 
   HKLM\System\CurrentControlSet\Control\Lsa
   Name: RestrictAnonymous
   Type: REG_DWORD Value: 1
2. Restart your computer.

Windows 2000:

1. Start "Control Panel-->Administrative Tools-->Local Security Policy".
2. Open "Local Policies-->Security Options".
3. Make sure "Additional restrictions of anonymous connections" is set to
"No access without explicit anonymous permissions". 
4. Restart your computer.

Windows XP/2003:

1. Start "Control Panel-->Administrative Tools-->Local Security Policy".
2. Open "Local Policies-->Security Options".
3. Make sure the following two policies are enabled:
   * Network Access: Do not allow anonymous enumeration of SAM accounts
   * Network Access: Do not allow anonymous enumeration of SAM accounts and shares
4. Disable Network Access: Let Everyone permissions apply to anonymous users.
5. Restart your computer.

Samba:

Make the following settings in smb.conf:
* set "security" to "user"
* set "domain" to "server"
* set "map_to_guest" to "Never"
RESULT:
No results available
QID:90134   Category:Windows   CVE ID:CAN-2004-0212
Vendor Reference:MS04-022
THREAT:
The security update for the Windows Task Scheduler code execution vulnerability (841873) as mentioned in the Microsoft Security Bulletin MS04-022 is not installed.

This update resolves a newly-discovered, privately reported vulnerability. A remote code execution vulnerability exists in the Task Scheduler because of an unchecked buffer. The vulnerability is documented in the vulnerability details section of this bulletin.

If a user is logged on with administrative privileges, a malicious user who successfully exploits this vulnerability could take complete control of an affected system, including installing programs, viewing, changing, or deleting data, or creating new accounts with full privileges.

In most cases, the RPC scheduler runs on ports 1025 to 1050. It may run on higher ports in some cases.

IMPACT:
Malicious users who successfully exploit this vulnerability could take complete control of an affected system.
SOLUTION:
Microsoft has released a patch and some workarounds for this vulnerability. Check Microsoft security bulletin MS04-022 for details.
RESULT:
MS04-022 RPC Test Succeeded.
QID:90244   Category:Windows   CVE ID:CAN-2005-0048 CAN-2004-0790 CAN-2004-1060 CAN-2004-0230 CAN-2005-0688
Vendor Reference:MS05-019
THREAT:
Microsoft Security Update MS05-019 was not found on the host. This update resolves the issues described below.

IP Validation Vulnerability:
A remote code execution vulnerability allows an attacker to send a specially crafted IP message to an affected system. An attacker who successfully exploits this vulnerability could cause the affected system to remotely execute code. However, attempts to exploit this vulnerability would most likely result in a denial of service. (CAN-2005-0048)

ICMP Connection Reset Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted Internet Control Message Protocol (ICMP) message to an affected system. An attacker who successfully exploits this vulnerability could cause the affected system to reset existing TCP connections. (CAN-2004-0790)

ICMP Path MTU Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted Internet Control Message Protocol (ICMP) message to an affected system, which could cause network performance to degrade and potentially stop the affected system from responding to requests. (CAN-2004-1060)

TCP Connection Reset Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted TCP message to an affected system. An attacker who successfully exploits this vulnerability could cause the affected system to reset existing TCP connections. (CAN-2004-0230)

Spoofed Connection Request Vulnerability:
A denial of service vulnerability allows an attacker to send a specially crafted TCP/IP message to an affected system. An attacker who successfully exploited this vulnerability could cause the affected system to stop responding. (CAN-2005-0688)

IMPACT:
An attacker who successfully exploits the most severe of these vulnerabilities could take complete control of an affected system. The attacker could then install programs, view/edit sensitive data, and create new accounts with full user rights. An attacker who successfully exploits the most severe of these vulnerabilities would most likely cause the affected system to stop responding.
SOLUTION:
The vendor has released a patch to address this issue. Refer to Microsoft security bulletin MS05-019 for information on this patch including installation instructions.

Note that the above patch does not cover Windows NT 4.0, which the vendor has stopped providing support for. We have confirmed that fully patched Windows NT 4.0 systems are also vulnerable to the issues.

RESULT:
Tested on port 25 with ICMP Destination Unreachable Type 3, Codes 2, 3, & 4 Hard Errors (with a
TCP Sequence Offset of 16 Bytes).
Tested on port 80 with ICMP Destination Unreachable Type 3, Codes 2, 3, & 4 Hard Errors (with a
TCP Sequence Offset of 16 Bytes).
QID:10977   Category:CGI   CVE ID:CAN-2002-1181 CAN-2002-0869 CAN-2002-1180 CAN-2002-1182
Vendor Reference:MS02-062
THREAT:
Microsoft IIS is prone to cross-site scripting attacks. This vulnerability is a result of improper sanitization of user-supplied input by IIS. Several Web pages, provided by IIS for administrative purposes, do not adequately sanitize user-supplied input. Any malicious HTML code that may be included in the URI will be executed.
IMPACT:
This vulnerability may be exploited to steal cookie-based authentication credentials from legitimate users of the Web site running the vulnerable software. With this information, an attacker may hijack a legitimate user's session.
SOLUTION:
The vendor has released a patch. Apply the latest patch, which is available for download from Microsoft's TechNet Web site.

This patch also fixes the following issues, which the host is most likely vulnerable to:

CAN-2002-0869: Out of Process Privilege Elevation
CAN-2002-1182: WebDAV Denial of Service
CAN-2002-1180: Script Source Access Vulnerability

It is always a good security practice to restrict access to the IISHelp directory.

RESULT:
GET
/iishelp/iis/htm/asp/iiatmd1.asp?ScriptLanguagePreference=<script>alert(4098)</script>
HTTP/1.1
Host: demo02.treutler.de
Connection: Keep-Alive

QID:10577   Category:CGI   CVE ID:CVE-2002-0071
Vendor Reference:N/A  
THREAT:
It's been reported that a heap overflow condition exists in the HTR ISAPI extension in Microsoft Internet Information Server (IIS) Versions 4.0 and 5.0.

By sending a series of specially malformed HTR requests, it could be possible for a malicious user to cause the IIS service to fail. Additionally, under a very difficult operational scenario, it could be possible to cause code to run on the server.

IMPACT:
If this vulnerability is successfully exploited, a malicious user could cause a denial of service condition or execute arbitrary instructions on the vulnerable host.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

RESULT:
No results available
QID:10684   Category:CGI   CVE ID:CVE-2002-0364
Vendor Reference:N/A  
THREAT:
It has been reported that the HTR ISAPI extension for Microsoft IIS is vulnerable to a heap overflow condition.

HTR is a scripting technology for IIS that has been largely superseded by ASP (Active Server Pages). A condition exists in the HTR ISAPI extension that may allow a remote attacker to overwrite locations in memory with attacker-supplied data. This condition affects IIS 5.0 and may be effectively mitigated by disabling the extension.

IMPACT:
Exploitation of this vulnerability may result in a denial of service condition or allow remote attackers to execute arbitrary instructions on the vulnerable host.
SOLUTION:
Microsoft has released a patch. Read Microsoft Security Bulletin MS02-018 for more information about this vulnerability and instructions for downloading a patch.
RESULT:
No results available
QID:19093   Category:Database   CVE ID:CAN-2001-0344
Vendor Reference:MS01-032
THREAT:
When a client connection to a SQL Server is terminated, it remains cached for a short period of time for performance reasons. One SQL query method contains a flaw that has the effect of making it possible for one user's query to reuse a cached connection that belonged to the sa account.
IMPACT:
Successful exploitation of this vulnerability enables an attacker to execute the query using the administrator's security context. This would give the attacker the ability to take any desired action on the database. Also, it gives the attacker the ability to run extended stored procedures, with the opportunity to run code of their choice and assume de facto control of the server itself.
SOLUTION:
Refer to Microsoft security bulletin MS01-032 for instructions on downloading and installing the patch.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:19090   Category:Database   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The latest Microsoft SQL security hotfixes are not installed. This check makes sure that Service Pack 4 is installed. The current version detected is shown in the result section of the vulnerability report.
IMPACT:
Microsoft SQL service packs and hotfixes are important because they fix a lot of security issues.
SOLUTION:
Apply the latest service packs and hotfixes available for download from the Microsoft SQL Server Support Center.
RESULT:
8.0.196
QID:70001   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Unauthorized remote users can list all file systems on this host that are accessible from a remote system.
IMPACT:
If successfully exploited, unauthorized users can use this information to brute force attack the shared resources and initiate file transfers with this server.
SOLUTION:
Use the Microsoft Computer Management MMC snap-in to connect and review the shares. By default C$, Admin$, and IPC$ are shared on all Windows machines.

Review the machine to ensure that users have not added any additional unauthorized shares, and that all exposed shares are valid .

If no shares are needed, you can filter all Microsoft networking ports (TCP ports 135, 137, 138, 139, 445 and UDP ports 135, 137, 138) at your firewall and disable null sessions to NetBIOS.

RESULT:
Device NameCommentType
IPC$Remote IPC3
ADMIN$Remote Admin0
C$Default share0
QID:70018   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Transmitting SMB requests to either port 445 or 139 without acknowledging the responses will cause a Denial of Service.
IMPACT:
As a result, Windows NT 4.0 will refuse all incoming network connections. In Windows 2000, any SMB-reliant services will be disabled until 20 seconds after the connection desists. Outgoing network connections in Windows 2000 are not affected by this vulnerability.
SOLUTION:
We are not aware of any vendor-supplied patches for this issue.

For a more technical description of this vulnerability, refer to the posting on BugTraq at the following link:
http://www.securityfocus.com/archive/1/Pine.SGI.4.05.10006050539051.21894-100000@samba.anu.edu.au

RESULT:
Windows 2000 LAN Manager
QID:70019   Category:SMB / NETBIOS   CVE ID:CAN-2000-0544
Vendor Reference:N/A  
THREAT:
Malicious remote users can cause a denial of service on a Windows NT or Windows 2000 host by submitting a malformed DCE/RPC SMBwriteX request containing an invalid data length.
IMPACT:
As a result of this vulnerability being exploited, the server will crash. In order to regain normal functionality, you must reboot it.
SOLUTION:
We are not aware of any vendor-supplied patches for this issue. Please check with the vendor (http://www.microsoft.com) for the latest information.
RESULT:
Windows 2000 LAN Manager
QID:90080   Category:Windows   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The scanner probed the Security & Accounts Database (SAM) and found that the target Windows box's Administrator account has a password that does not expire.
IMPACT:
Depending on the site's policy, this may be considered a security vulnerability since it allows attackers an infinite duration to try bruteforcing (guessing over multiple login attempts) the password for the account.
SOLUTION:
Reconfigure the Administrator account's properties to expire the password after a specified duration per the site's policy. Ideally, domain-wide policies should be set on the Domain Controller so that all Windows hosts on the domain comply automatically, and each individual host does not need to be configured.

Note that the Administrator account on the Domain Controller(s) will always have a password that does not expire, since the option check box in the properties dialog box for this account is greyed out.

RESULT:
No results available
QID:90063   Category:Windows   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Microsoft has released Service Pack 4 for Windows 2000 which contains many security fixes.

We reported this vulnerability because at least one of the following is true:

(1) We detected "IIS Redirection Response Contains Garbage Characters with Long URL" (Treutler ID 11330), which is fixed in Service Pack 4.
(2) We detected vulnerabilities fixed by the patch offered in Microsoft Security Bulletin MS02-018.
(3) We obtained the exact OS service pack information which shows that Service Pack 4 is not installed.

IMPACT:
Service Pack 4 for Windows 2000 addresses many issues, some of which are security related. For the list of bugs that are fixed in Windows 2000 Service Pack 4, see this Microsoft Knowledge Base Article.
SOLUTION:
Install the latest Service Pack, which is available for download from Microsoft's Web site.
RESULT:
MS02-018 not installed (QID 10569), detected on port 80.
MS02-018 not installed (QID 10569), detected on port 8521.
QID:105228   Category:Security Policy   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The built-in Guest account is not renamed at the target Microsoft Windows system.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Guest
QID:74082   Category:Mail services   CVE ID:CVE-2001-0504
Vendor Reference:MS01-037
THREAT:
The SMTP service in Windows 2000 contains a flaw in the authentication process. This flaw makes it possible for unauthorized remote users to successfully authenticate and use the SMTP service.
IMPACT:
This may lead to the abuse of SMTP services, such as mass e-mail relaying.
SOLUTION:
Microsoft released a patch to resolve this issue:
Microsoft Patch Q302755.
RESULT:
220 demo02 Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Wed, 7 Sep 2005 00:17:36
-0700
QID:50041   Category:Mail services   CVE ID:CVE-2002-0055
Vendor Reference:N/A  
THREAT:
It has been reported that the native Windows 2000 and XP Professional SMTP service encounters difficulties when attempting to handle certain types of malformed SMTP commands. A remote malicious user may be able to exploit this condition to cause a denial of service to the vulnerable software. The vulnerable software must be restarted to regain normal functionality.

This vulnerability is known to affect the following systems:

  • Microsoft Windows 2000 Professional and XP Professional operating systems with the SMTP service enabled (it is not enabled by default)
  • Microsoft Windows 2000 Server systems
  • Microsoft Windows 2000 systems running Microsoft Exchange 2000

The vulnerability is not present on any systems using Exchange 5.5.

IMPACT:
A remote malicious user may be able to exploit this vulnerability to cause a denial of service condition to the host. The SMTP service must be restarted to regain normal functionality.
SOLUTION:
Microsoft has released fixes to address this vulnerability. You can download patches from Microsoft Security Bulletin MS02-012. Furthermore, these fixes will be included in Windows 2000 Service Pack 3 and Windows XP Professional Service Pack 1.
RESULT:
220 demo02 Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Wed, 7 Sep 2005 00:17:36
-0700
QID:74147   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Your Mail Server responds to the EHLO command which implies that it uses the ESMTP protocol. ESMTP uses the AUTH command which indicates an authentication mechanism to the server. If the server supports the requested authentication mechanism, it performs an authentication protocol exchange to authenticate and identify the user. Optionally, it also negotiates a security layer for subsequent protocol interactions.

Your server accepts PLAIN or LOGIN as one of the AUTH parameters. The authentication credentials are transmitted in plaintext over the network and no encryption is performed.

IMPACT:
Malicious users could obtain mail server credentials by sniffing the traffic. This can allow unauthorized users to use the mail server as an open mail relay. It may also lead to compromise of account credentials that can be used to access other mail services like POP3 and IMAP.
SOLUTION:
Disable the plaintext authentication methods on your SMTP server for unencrypted (non-SSL/TLS) sessions. You may consider using more advanced challenge-based authentication methods like CRAM-MD5 or DIGEST-MD5.

Please contact your vendor for configuration information. Also check RFC 2554 and RFC 2487 for more details.

RESULT:
EHLO Treutlerguard.com


250-demo02 Hello [62.210.136.143]
250-AUTH GSSAPI NTLM LOGIN
250-AUTH=LOGIN
250-TURN
250-ATRN
250-SIZE 2097152
250-ETRN
250-PIPELINING
250-DSN
250-ENHANCEDSTATUSCODES
250-8bitmime
250-BINARYMIME
250-CHUNKING
250-VRFY
250 OK


QID:10118   Category:CGI   CVE ID:CVE-2000-0951
Vendor Reference:N/A  
THREAT:
Microsoft IIS is running on this host with the Index Server enabled.

Unauthorized remote users can view the entire root directory structure and all sub-directories due to a flaw in Web Distributed Authoring and Versioning (WebDAV) search implementation. Hidden directories, including files (*.inc), or other documents that would not normally be accessible through the regular Web site interface can be viewed. Sensitive files containing information, such as usernames and passwords, may be accessible.

IMPACT:
By exploiting this vulnerability, unauthorized users may be able to obtain a directory listing of a Web site.
SOLUTION:
Microsoft lists possible solutions and symptoms to this vulnerability in Article ID Q272079, which is available on Microsoft's Support Web site.

Microsoft recommends the following two resolutions:

1. If you are not using Index Server (for example, you don't have content on your Web site that you want to have searched), disable or uninstall the service.

2. In directories that contain sensitive information, be sure to disable the "Index this Resource" option on the appropriate tab (for example, a virtual directory on the Virtual Directory tab).

RESULT:
HTTP/1.1 207 Multi-Status
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:20:27 GMT
Content-Type: text/xml
Transfer-Encoding: chunked

<?xml version="1.0"?><a:multistatus
xmlns:b="urn:uuid:c2f41010-65b3-11d1-a29f-00aa00c14882/" xmlns:c="xml:"
xmlns:a="DAV:"><a:response><a:href>http://demo02.treutler.de/default.htm<
/a:href><a:propstat><a:status>HTTP/1.1 200
OK</a:status><a:prop><a:displayname>default.htm</a:displayname></a:prop&g
t;</a:propstat></a:response></a:multistatus>-CR-
QID:10569   Category:CGI   CVE ID:CVE-2002-0148
Vendor Reference:N/A  
THREAT:
Some versions of Microsoft Internet Information Server (IIS) contain the following cross-site scripting vulnerability. The HTTP Error Page created by IIS may, under some circumstances, contain HTML content that includes unsanitized user-supplied input.

A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.

IMPACT:
If this vulnerability is successfully exploited, a malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

Some IIS users have complained that the path MS02-018 failed to fix the cross-site scripting vulnerability in the error pages. To work around this, you may create or modify custom error pages to remove the vulnerable part:

1. Open the IIS Manager console.
2. Access the properties for your website.
3. Access 'Custom Errors' tab.
4. Modify error pages, replace or remove the line containing "document.write", "urlresult" and "displayresult".

RESULT:
GET /no9_such71_dir38 HTTP/1.0
Host: demo02.treutler.de



HTTP/1.1 404 Object Not Found
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:21:50 GMT
Content-Length: 3252
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html dir=ltr>

<head>
<style>
a:link {font:8pt/11pt verdana; color:FF0000}
a:visited {font:8pt/11pt verdana; color:#4e4e4e}
</style>

<META NAME="ROBOTS" CONTENT="NOINDEX">

<title>The page cannot be found</title>

<META HTTP-EQUIV="Content-Type" Content="text-html; charset=Windows-1252">
</head>

<script>
function Homepage(){
<!--
// in real bits, urls get returned to our script like this:
// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm

//For testing use DocURL =
"res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm"
DocURL = document.URL;

//this is where the http or https will be, as found by searching for :// but skipping the res://
protocolIndex=DocURL.indexOf("://",4);

//this finds the ending slash for the domain server
serverIndex=DocURL.indexOf("/",protocolIndex + 3);

//for the href, we need a valid URL to the domain. We search for the # symbol to find the begining

//of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end
marker.
//urlresult=DocURL.substring(protocolIndex - 4,serverIndex);
BeginURL=DocURL.indexOf("#",1) + 1;

urlresult=DocURL.substring(BeginURL,serverIndex);

//for display, we need to skip after http://, and go to the next slash
displayresult=DocURL.substring(protocolIndex + 3 ,serverIndex);

document.write( '<A HREF="' + escape(urlresult) + '">' + displayresult +
"</a>");
}
//-->
</script>

<body bgcolor="FFFFFF">

<table width="410" cellpadding="3" cellspacing="5">

<tr>
<td align="left" valign="middle" width="360">
<h1 style="COLOR:000000; FONT: 13pt/15pt verdana"><!--Problem-->The page
cannot be found</h1>
</td>
</tr>

<tr>
<td width="400" colspan="2">
<font style="COLOR:000000; FONT: 8pt/11pt verdana">The page you are looking for
might have been removed, had its name changed, or is temporarily
unavailable.</font></td>
</tr>

<tr>
<td width="400" colspan="2">
<font style="COLOR:000000; FONT: 8pt/11pt verdana">

<hr color="#C0C0C0" noshade>

<p>Please try the following:</p>

<ul>
<li>If you typed the page address in the Address bar, make sure that it is spelled
correctly.<br>
</li>

<li>Open the

<script>
<!--
if (!((window.navigator.userAgent.indexOf("MSIE") > 0) &&
(window.navigator.appVersion.charAt(0) == "2")))
{
Homepage();
}
//-->
</script>

home page, and then look for links to the information you want.</li>

<li>Click the <a href="javascript:history.back(1)">Back</a> button
to try another link.</li>
</ul>

<h2 style="font:8pt/11pt verdana; color:000000">HTTP 404 - File not
found<br>
Internet Information Services<BR></h2>

<hr color="#C0C0C0" noshade>

<p>Technical Information (for support personnel)</p>

<ul>
<li>More information:<br>
<a
href="http://www.microsoft.com/ContentRedirect.asp?prd=iis&sbp=&pver=5.0&pid=&I
D=404&cat=web&os=&over=&hrd=&Opt1=&Opt2=&Opt3="
target="_blank">Microsoft Support</a>
</li>
</ul>

</font></td>
</tr>

</table>
</body>
</html>
QID:10564   Category:CGI   CVE ID:CVE-2002-0075
Vendor Reference:N/A  
THREAT:
Some versions of Microsoft Internet Information Server (IIS) contain the following cross-site scripting vulnerability. The HTTP Redirect page created by IIS may, under some circumstances, contain HTML content that includes unsanitized user-supplied input.

A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.

IMPACT:
If this vulnerability is successfully exploited, a malicious user can obtain sensitive data and cookie information, or subvert the content and functionality of the site.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

RESULT:
GET /scripts?"><script>alert("no9_such71_dir38");</script> HTTP/1.0
Host: demo02.treutler.de



HTTP/1.1 302 Object Moved
Location:
http://demo02.treutler.de/scripts/?"><script>alert("no9_such71_dir38");</s
cript>
Server: Microsoft-IIS/5.0
Content-Type: text/html
Content-Length: 202

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a
HREF="http://demo02.treutler.de/scripts/?"><script>alert("no9_such71_dir38&qu
ot;);</script>">here</a></body>
QID:10567   Category:CGI   CVE ID:CVE-2002-0072
Vendor Reference:N/A  
THREAT:
A vulnerability has been identified in the way Microsoft Internet Information Server (IIS) handles URL errors. This vulnerability exists on Microsoft IIS servers that also have Front Page Server Extensions or ASP.NET installed.

If a particular ISAPI filter, which is installed with Front Page Server Extensions and ASP.NET, receives a URL that exceeds the maximum allowable length, the IIS service will fail. The ISAPI filter fails the request and sets the URL to a null value. When IIS receives the null value, it still attempts to process the request before returning an error message. This results in an access violation error, which causes the IIS service to fail.

So far, Microsoft has only identified this issue in one ISAPI filter. However, there is a possibility that other ISAPI filters could contain the same behavior. The vulnerability is not within the ISAPI filter itself, but with the way that IIS handles the null value returned by the filter.

IMPACT:
If this vulnerability is successfully exploited, the IIS service will stop responding and a denial of service will occur. On Microsoft IIS 4.0 servers, you must manually restart the service in order to regain normal functionality. On Microsoft IIS 5.0 and 5.1 servers, the service will automatically restart.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

RESULT:
No results available
QID:10565   Category:CGI   CVE ID:CVE-2002-0074
Vendor Reference:N/A  
THREAT:
Some versions of Microsoft Internet Information Server (IIS) contain the following cross-site scripting vulnerability. The Help File search functionality included with IIS may, under some circumstances, contain HTML content that includes unsanitized user-supplied input.

A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.

IMPACT:
If this vulnerability is exploited, a malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has apparently been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

RESULT:
No results available
QID:19092   Category:Database   CVE ID:CAN-2000-1082 CAN-2000-1083 CAN-2000-1084 CAN-2000-1085 CAN-2000-1086 CAN-2000-1087 CAN-2000-1088
Vendor Reference:MS00-092
THREAT:
Extended Stored Procedures (XPs) are DLLs that can be installed by an SQL Server administrator for providing enhanced functionality within SQL Server.

SQL Server provides an API called srv_paraminfo() for parsing input parameters for XPs. This API has a flaw that could result in a buffer overrun condition.

The API is designed to locate the nth parameter in a string, and put it into a buffer provided by the XP. By design, the API does not provide a way for the XP to indicate the length of the buffer. Instead, the XP is expected to ensure that the buffer will be large enough to hold the parameter. However, not all XPs provided by default in SQL Server perform this checking.

Any malicious user who provides a sufficiently-long parameter to an affected XP could cause a buffer overrun within srv_paraminfo(). The malicious user may do this in order to cause the SQL Server to fail or to execute malicious code.

IMPACT:
There are two scenarios in which a malicious user might try to exploit this vulnerability:

The malicious user might try to attack an SQL Server directly by logging onto it and calling an XP. This is only possible if the user is able to successfully authenticate to the SQL Server.

The malicious user might try to attack a database server serving as a back-end to a Web server by providing carefully chosen inputs to the Web application.

However, XPs are rarely used by Web applications. Even if a Web application uses an XP, the malicious user would need detailed knowledge of the application design in order to feed it parameters that would pass to the XP and subsequently to srv_paraminfo() in such a way as to exploit the unchecked buffer.

SOLUTION:
Refer to Microsoft security bulletin MS00-092 for instructions on obtaining and installing the patch.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:19097   Category:Database   CVE ID:CAN-2002-0624 CAN-2002-0641 CAN-2002-0642
Vendor Reference:MS02-034
THREAT:
This is a cumulative patch that includes the functionality of all previously released patches for SQL Server 2000. In addition, it eliminates three newly discovered vulnerabilities affecting SQL Server 2000 and MSDE 2000 (but not any previous versions of SQL Server or MSDE), which are described below.

A buffer overrun vulnerability in a procedure used to encrypt SQL Server credential information. An attacker who was able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself depending on the account that the SQL Server runs as.

A buffer overrun vulnerability in a procedure that relates to the bulk inserting of data in SQL Server tables. An attacker who is able to successfully exploit this vulnerability could gain significant control over the database and possibly the server itself.

A privilege elevation vulnerability that results because of incorrect permissions on the Registry key that stores the SQL Server service account information. An attacker who is able to successfully exploit this vulnerability could gain greater privileges on the system than had been granted by the system administrator - potentially even the same rights as the operating system.

IMPACT:
These vulnerabilities can be exploited by a malicious attacker to gain control over the database and possibly the server itself.
SOLUTION:
Refer to Microsoft security bulletin MS02-034 for instructions on downloading and installing the patch.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:10569   Category:CGI   CVE ID:CVE-2002-0148
Vendor Reference:N/A  
THREAT:
Some versions of Microsoft Internet Information Server (IIS) contain the following cross-site scripting vulnerability. The HTTP Error Page created by IIS may, under some circumstances, contain HTML content that includes unsanitized user-supplied input.

A malicious user may construct a link to a vulnerable server such that it exploits this vulnerability. When an innocent user follows this link, script code will be reproduced by the server, and execute within the context of the vulnerable site. As a result, the malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.

IMPACT:
If this vulnerability is successfully exploited, a malicious user may be able to obtain sensitive data and cookie information, or subvert the content and functionality of the site.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

Some IIS users have complained that the path MS02-018 failed to fix the cross-site scripting vulnerability in the error pages. To work around this, you may create or modify custom error pages to remove the vulnerable part:

1. Open the IIS Manager console.
2. Access the properties for your website.
3. Access 'Custom Errors' tab.
4. Modify error pages, replace or remove the line containing "document.write", "urlresult" and "displayresult".

RESULT:
GET /no9_such71_dir38 HTTP/1.0
Host: demo02.treutler.de:8521



HTTP/1.1 403 Access Forbidden
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:38:53 GMT
Content-Length: 3295
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html dir=ltr>

<head>
<style>
a:link {font:8pt/11pt verdana; color:FF0000}
a:visited {font:8pt/11pt verdana; color:#4e4e4e}
</style>

<META NAME="ROBOTS" CONTENT="NOINDEX">

<title>You are not authorized to view this page</title>

<META HTTP-EQUIV="Content-Type" Content="text-html; charset=Windows-1252">
</head>

<script>
<!--
function Homepage(){

// in real bits, urls get returned to our script like this:
// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm

//For testing use DocURL =
"res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm"
DocURL=document.URL;

//this is where the http or https will be, as found by searching for :// but skipping the res://
protocolIndex=DocURL.indexOf("://",4);

//this finds the ending slash for the domain server
serverIndex=DocURL.indexOf("/",protocolIndex + 3);

//for the href, we need a valid URL to the domain. We search for the # symbol to find the begining
//of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end
marker.
//urlresult=DocURL.substring(protocolIndex - 4,serverIndex);
BeginURL=DocURL.indexOf("#",1) + 1;
urlresult=DocURL.substring(BeginURL,serverIndex);

//for display, we need to skip after http://, and go to the next slash
displayresult=DocURL.substring(protocolIndex + 3 ,serverIndex);
document.write( '<A HREF="' + escape(urlresult) + '">' + displayresult +
"</a>");
}
//-->
</script>

<body bgcolor="FFFFFF">

<table width="410" cellpadding="3" cellspacing="5">

<tr>
<td align="left" valign="middle" width="360">
<h1 style="COLOR:000000; FONT: 13pt/15pt verdana"><!--Problem-->You are not
authorized to view this page</h1>
</td>
</tr>

<tr>
<td width="400" colspan="2">
<font style="COLOR:000000; FONT: 8pt/11pt verdana">You do not have permission to
view this directory or page from the Internet address of your Web browser.</font></td>
</tr>

<tr>
<td width="400" colspan="2">
<font style="COLOR:000000; FONT: 8pt/11pt verdana">

<hr color="#C0C0C0" noshade>

<p>If you believe you should be able to view this directory or page, please contact the
Web site administrator by using the e-mail address or phone number listed on the

<script>
<!--
if (!((window.navigator.userAgent.indexOf("MSIE") > 0) &&
(window.navigator.appVersion.charAt(0) == "2")))
{
Homepage();
}
//-->
</script>

home page.</p>

<h2 style="font:8pt/11pt verdana; color:000000">HTTP 403.6 - Forbidden: IP
address rejected<br>
Internet Information Services</h2>

<hr color="#C0C0C0" noshade>

<p>Technical Information (for support personnel)</p>

<ul>
<p>
<li>Background:<br>
This error is caused when the server has a list of IP addresses that are not allowed to access the
site, and the IP address you are using is in this list.</p>

<p>
<li>More information:<br>
<a
href="http://www.microsoft.com/ContentRedirect.asp?prd=iis&sbp=&pver=5.0&pid=&I
D=403.6&cat=web&os=&over=&hrd=&Opt1=&Opt2=&Opt3="
target="_blank">Microsoft Support</a>
</li></p>
</ul>

</font></td>
</tr>

</table>
</body>
</html>
QID:10567   Category:CGI   CVE ID:CVE-2002-0072
Vendor Reference:N/A  
THREAT:
A vulnerability has been identified in the way Microsoft Internet Information Server (IIS) handles URL errors. This vulnerability exists on Microsoft IIS servers that also have Front Page Server Extensions or ASP.NET installed.

If a particular ISAPI filter, which is installed with Front Page Server Extensions and ASP.NET, receives a URL that exceeds the maximum allowable length, the IIS service will fail. The ISAPI filter fails the request and sets the URL to a null value. When IIS receives the null value, it still attempts to process the request before returning an error message. This results in an access violation error, which causes the IIS service to fail.

So far, Microsoft has only identified this issue in one ISAPI filter. However, there is a possibility that other ISAPI filters could contain the same behavior. The vulnerability is not within the ISAPI filter itself, but with the way that IIS handles the null value returned by the filter.

IMPACT:
If this vulnerability is successfully exploited, the IIS service will stop responding and a denial of service will occur. On Microsoft IIS 4.0 servers, you must manually restart the service in order to regain normal functionality. On Microsoft IIS 5.0 and 5.1 servers, the service will automatically restart.
SOLUTION:
Microsoft released an IIS cumulative patch to address several vulnerabilities, including this one. For more information regarding these IIS vulnerabilities and for patch download locations and instructions, read Microsoft Security Bulletin MS02-018.

There are reports of problems with the cumulative patch for users who are running Microsoft IIS Site Server. A hotfix to address problems caused as a side effect of installing the cumulative patch has been released by Microsoft. Any users who have experienced difficulties as a result of installing the cumulative patch are advised to contact Microsoft support and request hotfix Q317815.

RESULT:
No results available
QID:82052   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
When a host receives an IP packet with a protocol called a "Probe" that it does not support, the host normally responds with an ICMP Protocol Unreachable (ICMP type of 3 and ICMP code of 2) packet. This ICMP packet consists of an IP header, an ICMP header, and some ICMP payload. The ICMP payload normally contains the IP header of the Probe and all or part of the IP payload. In some TCP/IP implementations, the ICMP payload has a fixed size or a minimum size. When this fixed or minimum size exceeds the size of the Probe, zero padding bytes should be used to pad up the ICMP packet to its fixed or minimum size. However, it was observed that non-zero padding bytes were used by the host. These non-zero padding bytes are likely to be part of the kernel memory.
IMPACT:
This vulnerability may be exploited to obtain sensitive information on the host. It may also help a remote attacker to fingerprint the operating system running on the host.
SOLUTION:
Contact the vendor of the system for further information and a possible patch for this issue.
RESULT:
Padding bytes: D2 00 00 00 00 00 00
QID:82054   Category:TCP/IP   CVE ID:CAN-2004-0230
Vendor Reference:N/A  
THREAT:
TCP provides stateful communications between hosts on a network. TCP sessions are established by a three-way handshake and use random 32-bit sequence and acknowledgement numbers to ensure the validity of traffic. A vulnerability was reported that may permit TCP sequence numbers to be more easily approximated by remote attackers. This issue affects products released by multiple vendors.

The cause of the vulnerability is that affected implementations will accept TCP sequence numbers within a certain range, known as the acknowledgement range, of the expected sequence number for a packet in the session. This is determined by the TCP window size, which is negotiated during the three-way handshake for the session. Larger TCP window sizes may be set to allow for more throughput, but the larger the TCP window size, the more probable it is to guess a TCP sequence number that falls within an acceptable range. It was initially thought that guessing an acceptable sequence number was relatively difficult for most implementations given random distribution, making this type of attack impractical. However, some implementations may make it easier to successfully approximate an acceptable TCP sequence number, making these attacks possible with a number of protocols and implementations.

This is further compounded by the fact that some implementations may support the use of the TCP Window Scale Option, as described in RFC 1323, to extend the TCP window size to a maximum value of 1 billion.

This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.

There are a few factors that may present viable target implementations, such as those which depend on long-lived TCP connections, those that have known or easily guessed IP address endpoints and those implementations with easily guessed TCP source ports. It has been noted that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack, due to the use of long-lived TCP sessions and the possibility that some implementations may use the TCP Window Scale Option. As a result, this issue is likely to affect a number of routing platforms.

Another factor to consider is the relative difficulty of injecting packets into TCP sessions, as a number of receiving implementations will reassemble packets in order, dropping any duplicates. This may make some implementations more resistant to attacks than others.

It should be noted that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further.

IMPACT:
Successful exploitation of this issue could lead to denial of service attacks on the TCP based services of target hosts. Other consequences may also result, such as man-in-the-middle attacks.
SOLUTION:
Please first check the results section below for the port number on which this vulnerability was detected. If that port number is known to be used for port-forwarding, then it is the backend host that is really vulnerable.

Various implementations and products including Check Point, Cisco, Cray Inc, Hitachi, Internet Initiative Japan, Inc (IIJ), Juniper Networks, NEC, Polycom, and Yamaha are currently undergoing review. Contact the vendors to obtain more information about affected products and fixes. NISCC Advisory 236929 - Vulnerability Issues in TCP details the vendor patch status as of the time of the advisory, and identifies resolutions and workarounds.

The Internet Engineering Task Force (IETF) has developed an Internet-Draft titled Transmission Control Protocol Security Considerations that addresses this issue.

Workaround:

The following BGP-specific workaround information has been provided.

For BGP implementations that support it, the TCP MD5 Signature Option should be enabled. Passwords that the MD5 checksum is applied to should be set to strong values and changed on a regular basis.

Secure BGP configuration instructions have been provided for Cisco and Juniper at these locations:
http://www.cymru.com/Documents/secure-bgp-template.html
http://www.qorbit.net/documents/junos-bgp-template.pdf

RESULT:
Tested on port 25 with an injected SYN/RST offset by 16 bytes.
Tested on port 80 with an injected SYN/RST offset by 16 bytes.
QID:82058   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target host is vulnerable to a denial of service condition. The TCP stack present on the host allows an ICMP hard-error packet to reset an established TCP connection that the packet identifies. An example ICMP hard error (defined in the IETF RFCs) is the ICMP message "fragmentation required, but Do-Not-Fragment bit is set".
IMPACT:
Since ICMP packets can be spoofed, attackers can exploit this issue by guessing the IP address and port numbers of a TCP connection established on the host, and then resetting these connections simply by sending an ICMP hard-error packet.
SOLUTION:
So far, it is not known exactly which network stacks are vulnerable. Since the host has been found to be vulnerable through this active probing, it is recommended that you contact the vendor of the host's operating system. A fix typically requires an operating system patch to be installed on the target.

A workaround is to block ICMP hard-error packets using a firewall.

RESULT:
Tested on port 25 with ICMP Destination Unreachable Type 3, Codes 2, 3, & 4 Hard Errors (with a
TCP Sequence Offset of 16 Bytes).
Tested on port 80 with ICMP Destination Unreachable Type 3, Codes 2, 3, & 4 Hard Errors (with a
TCP Sequence Offset of 16 Bytes).
QID:70000   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Unauthorized users can obtain this host's NetBIOS server name from a remote system.
IMPACT:
Unauthorized users can obtain the list of NetBIOS servers on your network. This list outlines trust relationships between server and client computers. Unauthorized users can therefore use a vulnerable host to penetrate secure servers.
SOLUTION:
If the NetBIOS service is not required on this host, disable it. Otherwise, block any NetBIOS traffic at your network boundaries.
RESULT:
IS~DEMO02
QID:90043   Category:Windows   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This host does not seem to be using SMB (Server Message Block) signing. SMB signing adds security to a network using NetBIOS, avoiding man-in-the-middle attacks.
IMPACT:
Unauthorized users sniffing the network could catch many challege/response exchanges and replay the whole thing to grab particular session keys, and then authenticate on the Domain Controller.
SOLUTION:
To enable SMB signing under Windows, add two REG_WORD entries 'EnableSecuritySignature' and 'RequireSecuritySignature' with value of '1' to the following registry key:

Under Windows NT4/2000/2003 Server:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters

Under Windows NT4 Client:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Rdr\Parameters

Under Windows XP/2000 Client:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanManWorkstation\Parameters

For more information about enabling SMB signing on Windows 98 platforms, read Microsoft Microsoft Knowledge Base Article - 230545, which can be found on Microsoft's Support Web site.

For a Samba server, the server global configuration "server signing = mandatory" (in the smb.conf file) requires clients to use SMB signing offered by the server.

If you decide to enable SMB signing, be sure to enable it on all the clients on your network, or you will encounter problems connecting from clients not using SMB signing.

RESULT:
No results available
QID:90081   Category:Windows   CVE ID:CAN-1999-0585
Vendor Reference:N/A  
THREAT:
The scanner probed the LSA, Local Security Authority, for the administrator account's name. The target has the default/out-of-the-box name "Administrator" set.
IMPACT:
Most attackers and malicious scripts assume an administrator account name of "Administrator" on Windows systems. If the target has not changed this name, it will simplify the task of the attacker, for example in bruteforcing the password for the account.
SOLUTION:
Change the administrator account's name to a non-default value.

Please note that if the scanner has been configured to use Windows Authentication and uses the local administrator account (as against a domain-admin account) to scan this target, the scanner will need to be reconfigured to use the new administrator account name instead.

RESULT:
Administrator
QID:50078   Category:Mail services   CVE ID:N/A  
Vendor Reference:Q813050
THREAT:
When Microsoft's mail server (within Exchange 2000 or on Windows 2000) receives a message over the SMTP protocol and the message ends the data frame with CRLF.CRLF QUIT CRLF, the mail server responds to the pipelined QUIT command with "500 5.3.3 Unrecognized Command". The same behavior occurs with other pipelined commands such as RSET.
IMPACT:
This vulnerability allows a remote user to determine if the Windows 2000 host has Service Pack 4 installed. This information may assist in launching further attacks against the host.
SOLUTION:
This vulnerability is fixed in Windows 2000 Service Pack 4. Install the latest Service Pack, which is available for download from Microsoft's Web site.

The following link offers more information about this vulnerability: http://support.microsoft.com/default.aspx?kbid=813050.

It has been reported that this issue still exists on some Windows 2000 systems after Service Pack 4 is installed.

RESULT:
No results available
QID:86473   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A Web server was detected that supports the HTTP TRACE method. This method allows debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS web server uses an alias TRACK for this method, and is functionally the same.

A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.

The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.

Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.

The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.

IMPACT:
If this vulnerability is successfully exploited, users of the Web server may lose their authentication credentials for the server and/or for the Web applications hosted by the server to an attacker. This may be the case even if the Web applications are not vulnerable to cross site scripting attacks due to input validation errors.
SOLUTION:
Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.

Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
</IfModule>
With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.

A slightly tighter fix is to use:

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$
RewriteRule .* - [F]
</IfModule>

Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.

URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.

Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.

For more details about other web servers : Cert Advisory.

RESULT:
TRACE / HTTP/1.1
Host: demo02.treutler.de
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:20:51 GMT
Content-Type: message/http
Content-Length: 88

TRACE / HTTP/1.1
Host: demo02.treutler.de
Via: <script>alert('TreutlerXSS');</script>

TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:20:51 GMT
Connection: keep-alive
Content-Type: message/http
Content-Length: 63

TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

TRACK / HTTP/1.1
Host: demo02.treutler.de
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:20:51 GMT
Content-Type: message/http
Content-Length: 88

TRACK / HTTP/1.1
Host: demo02.treutler.de
Via: <script>alert('TreutlerXSS');</script>

TRACK / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:20:52 GMT
Connection: keep-alive
Content-Type: message/http
Content-Length: 63

TRACK / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

QID:86241   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
HTTP and the WebDAV extension allow file information to be retrieved remotely from the Web server. If there is no restricted access, anyone can retrieve information (like directory listings) from the Web server.
IMPACT:
Malicious use of this HTTP method could possibly result in compromising some confidential information stored in Web server files.
SOLUTION:
Disable WebDAV as mentioned in the Microsoft article titled How to disable WebDAV for IIS 5.0.

For IIS 6.0, please refer the document on configuring dynamic content.

RESULT:
HTTP/1.1 207 Multi-Status
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:21:00 GMT
Content-Type: text/xml
Transfer-Encoding: chunked

<?xml version="1.0"?><a:multistatus
xmlns:b="urn:uuid:c2f41010-65b3-11d1-a29f-00aa00c14882/" xmlns:c="xml:"
xmlns:a="DAV:"><a:response><a:href>http://demo02.treutler.de/</a:href>
<a:propstat><a:status>HTTP/1.1 200
OK</a:status><a:prop><a:getcontentlength
b:dt="int">0</a:getcontentlength><a:creationdate
b:dt="dateTime.tz">2002-06-18T13:24:50.265Z</a:creationdate><a:displayname>
/</a:displayname><a:getetag>"7e72167c9f64c21:658d"</a:getetag><a:getl
astmodified b:dt="dateTime.rfc1123">Wed, 25 Sep 2002 14:26:06
GMT</a:getlastmodified><a:resourcetype><a:collection/></a:resourcetype><a
:supportedlock/><a:ishidden b:dt="boolean">0</a:ishidden><a:iscollection
b:dt="boolean">1</a:iscollection><a:getcontenttype>application/octet-stream
</a:getcontenttype></a:prop></a:propstat></a:response></a:multistatus>
-CR-
QID:86693   Category:Web server   CVE ID:CAN-2002-0419
Vendor Reference:N/A  
THREAT:
NTLM authentication is enabled on the Microsoft IIS Web server. This allows a remote user to perform account brute force by requesting a non-existing HTTP resource or an existing HTTP resource that does not actually require authentication. Requests would include the "Authorization: NTLM" field.
IMPACT:
If the host has an account lockout policy in place, a remote user may exploit this vulnerability to lockout a local user, provided that the name of the local user is known.

If the host does not have an account lockout policy in place, a remote user may exploit this vulnerability to brute force user passwords.

Note that the Windows user list may sometimes be obtained by exploiting other vulnerabilities. Windows also has a few easy-to-guess default names for built-in accounts: "Administrator" for administering the computer/domain, "Guest" for guest access, "IUSR_<MachineName>" for anonymous access to IIS, and "IWAM_<Machinename>" for IIS to start out of process applications. Here the machine name <Machinename> may be obtained via Windows UDP Netbios NS (port 137).

Among the above built-in accounts, the account lockout policy, even if it is in place, does not apply to the administrator account. So if the host uses a default name of "Administrator" for the administrator account, the password brute force of this account is possible through the "Printers" authentication interface.

In addition, if the request has the NTLMSSP_REQUEST_TARGET flag on, the Web server may respond to the request with an NTLM challenge that contains sensitive host information, such as the Windows server and domain in which the authentication will be checked.

SOLUTION:
There are no vendor-supplied solutions available at this time.

As a workaround, disable NTLM authentication for your Web server. This can be done by unchecking "Integrated Windows Authentication" within "Authentication Method" under "Directory Security" in "Default Web Site Properties".

RESULT:
GET / HTTP/1.1
Host: demo02.treutler.de
Connection: Keep-Alive
Authorization: NTLM TlRMTVNTUAABAAAAA7IAAAAAAAAgAAAADwAPACAAAABRVUFMWVMtR08wSVFZWU4AAA==

HTTP/1.1 401 Access Denied
Server: Microsoft-IIS/5.0
Date: Wed, 07 Sep 2005 07:21:15 GMT
WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAAAAADAAAAABggAADE1Dcyu8VX8AAAAAAAAAAAAAAAAwAAAA
Content-Length: 3245
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html dir=ltr>

<head>
<style>
a:link {font:8pt/11pt verdana; color:FF0000}
a:visited {font:8pt/11pt verdana; color:#4e4e4e}
</style>

<META NAME="ROBOTS" CONTENT="NOINDEX">

<title>You are not authorized to view this page</title>

<META HTTP-EQUIV="Content-Type" Content="text-html; charset=Windows-1252">
</head>

<script>
function Homepage(){
<!--
// in real bits, urls get returned to our script like this:
// res://shdocvw.dll/http_404.htm#http://www.DocURL.com/bar.htm

//For testing use DocURL =
"res://shdocvw.dll/http_404.htm#https://www.microsoft.com/bar.htm"
DocURL=document.URL;

//this is where the http or https will be, as found by searching for :// but skipping the res://
protocolIndex=DocURL.indexOf("://",4);

//this finds the ending slash for the domain server
serverIndex=DocURL.indexOf("/",protocolIndex + 3);

//for the href, we need a valid URL to the domain. We search for the # symbol to find the begining
//of the true URL, and add 1 to skip it - this is the BeginURL value. We use serverIndex as the end
marker.
//urlresult=DocURL.substring(protocolIndex - 4,serverIndex);
BeginURL=DocURL.indexOf("#",1) + 1;
urlresult=DocURL.substring(BeginURL,serverIndex);

//for display, we need to skip after http://, and go to the next slash
displayresult=DocURL.substring(protocolIndex + 3 ,serverIndex);
document.write( '<A HREF="' + escape(urlresult) + '">' + displayresult +
"</a>");
}
//-->
</script>

<body bgcolor="FFFFFF">

<table width="410" cellpadding="3" cellspacing="5">

<tr>
<td align="left" valign="middle" width="360">
<h1 style="COLOR:000000; FONT: 13pt/15pt verdana"><!--Problem-->You are not
authorized to view this page</h1>
</td>
</tr>

<tr>
<td width="400" colspan="2">
<font style="COLOR:000000; FONT: 8pt/11pt verdana">You do not have permission to
view this directory or page using the credentials you supplied.</id></font></td>
</tr>

<tr>
<td width="400" colspan="2">
<font style="COLOR:000000; FONT: 8pt/11pt verdana">
<hr color="#C0C0C0" noshade>
<p>Please try the following:</p>

<ul>
<li>Click the <a href="javascript:location.reload()">Refresh</a> button
to try again with different credentials.</li>

<li>If you believe you should be able to view this directory or page, please contact the Web
site administrator by using the e-mail address or phone number listed on the

<script>
<!--
if (!((window.navigator.userAgent.indexOf("MSIE") > 0) &&
(window.navigator.appVersion.charAt(0) == "2")))
{
Homepage();
}
//-->
</script> home
page.</li>
</ul>

<h2 style="font:8pt/11pt verdana; color:000000">HTTP 401.1 - Unauthorized: Logon
Failed<br>
Internet Information Services</h2>

<hr color="#C0C0C0" noshade>

<p>Technical Information (for support personnel)</p>

<ul>
<li>More information:<br>
<a
href="http://www.microsoft.com/ContentRedirect.asp?prd=iis&sbp=&pver=5.0&pid=&I
D=401.1&cat=web&os=&over=&hrd=&Opt1=&Opt2=&Opt3="
target="_blank">Microsoft Support</a>
</li>

</font></td>
</tr>

</table>
</body>
</html>
QID:19095   Category:Database   CVE ID:CAN-2001-0542 CAN-2001-0879
Vendor Reference:MS01-060
THREAT:
SQL Server 2000 provides a number of functions that enable database queries to generate text messages. In some cases, the functions create a text message and store it in a variable, while in others the functions directly display the message. Two vulnerabilities associated with these functions have been discovered.

The first vulnerability results because of a flaw in the functions themselves. Several of the functions do not adequately verify that the requested text will fit into the buffer that is supplied to hold the text. A buffer overrun could occur as a result, and could be used either to run code in the security context of the SQL Server service or to cause the SQL Server service to fail. SQL Server can be configured to run in various security contexts, and by default runs as a domain user. The precise privileges an attacker could gain depends on the specific security context that the service runs in.

The second vulnerability results because of a format string vulnerability in the C runtime functions that the SQL Server functions call when installed on Windows 2000 or Windows XP. Although format string vulnerabilities often can be exploited to run code of the attacker's choice, that is not true in this case. Because of the specific way this vulnerability occurs, the C runtime code would always be overrun with the same values regardless of the attacker's inputs. As a result, this vulnerability could only be used as a denial of service.

IMPACT:
An attacker could exploit the vulnerabilities in either of two ways. The most direct way would be for the attacker to simply load and execute a database query that calls one of the affected functions. Alternatively, if a Web site or other database front-end would accept and process arbitrary queries, it could be possible for the attacker to provide inputs that would cause the query to call an affected function with the appropriate parameters.
SOLUTION:
Refer to Microsoft security bulletin MS01-060 for instructions on downloading and installing the patch.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:19098   Category:Database   CVE ID:CAN-2002-0721
Vendor Reference:MS02-043
THREAT:
Microsoft SQL Server 2000 cumulative patch (described in the Microsoft Security Bulletin MS02-043) is not installed on the host.
IMPACT:
The SQL Server 2000 cumulative patch includes fixes for various security holes, which may be exploited by malicious users.
SOLUTION:
Refer to Microsoft security bulletin MS02-043 for more details on this cumulative patch.

It's recommended that you install the latest Microsoft SQL Server service pack (sp3a or later). You can download the latest service pack from Microsoft's SQL Server Download page.

RESULT:
8.0.196
QID:82003   Category:TCP/IP   CVE ID:CAN-1999-0524
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. It's principal purpose is to provide a protocol layer able to inform gateways of the inter-connectivity and accessibility of other gateways or hosts. "ping" is a well-known program for determining if a host is up or down. It uses ICMP echo packets. ICMP timestamp packets are used to synchronize clocks between hosts.
IMPACT:
Unauthorized users can obtain information about your network by sending ICMP timestamp packets. For example, the internal systems clock should not be disclosed since some internal daemons use this value to calculate ID or sequence numbers (i.e., on SunOS servers).
SOLUTION:
You can filter ICMP messages of type "Timestamp" and "Timestamp Reply" at the firewall level. Some system administrators choose to filter most types of ICMP messages for various reasons. For example, they may want to protect their internal hosts from ICMP-based Denial Of Service attacks, such as the Ping of Death or Smurf attacks.

However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) are necessary for proper behavior of Operating System TCP/IP stacks.

It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.

RESULT:
time stamp of host: 06:20:43 GMT
QID:86316   Category:Web server   CVE ID:CAN-2002-0419
Vendor Reference:N/A  
THREAT:
Microsoft IIS supports Basic and NTLM authentication. It has been reported that the authentication methods supported by a given IIS server can be revealed to an attacker through the inspection of returned error messages, even when anonymous access is also granted.

When a valid authentication request is submitted (for either method) with an invalid username and password, an error message is returned. This happens even if anonymous access to the requested resource is allowed.

IMPACT:
If this vulnerability is successfully exploited, a malicious user can learn what authentication method is used. This information can then be used in further intelligent attacks against the server, or in a brute force password attack against a known user name.
SOLUTION:
We are not currently aware of any vendor-supplied fixes for this issue. Please check Microsoft's Web site (http://www.microsoft.com) for the latest information.
RESULT:
NTLM
QID:70029   Category:SMB / NETBIOS   CVE ID:CAN-2003-0345
Vendor Reference:MS03-024
THREAT:
Microsoft Server Message Block (SMB) is the protocol used by Windows to handle file, printer, and serial port network resource shares. SMB is also used to communicate between systems using mail slots and named pipes.

Microsoft SMB request handler has been reported prone to a buffer overflow vulnerability. It's possible to craft a malicious SMB request packet containing parameters that will trigger the assignment of an insufficient buffer in memory. A remote authenticated attacker may create an insufficient bounds checking condition in the affected handler. In this way, an attacker may corrupt memory adjacent to the affected buffer with excessive attacker-supplied data.

IMPACT:
Depending on the layout of memory, this vulnerability may be exploited to cause a denial of service condition, or ultimately the execution of arbitrary attacker-supplied code.

Note that the attacker must be authenticated by the target SMB server to successfully exploit this vulnerability.

SOLUTION:
Microsoft has released fixes for all affected Windows versions. You can find the appropriate patch for your version in Microsoft Security Bulletin MS03-024.

For Windows 2000 users, please note that fix is included in Microsoft Windows 2000 SP4. Users should upgrade to that version, which is available for download from Microsoft's Web site. Users of Datacenter platforms will likely need to contact their vendor to obtain updates.
RESULT:
Windows 2000 LAN Manager
QID:86531   Category:Web server   CVE ID:CAN-2003-0227
Vendor Reference:MS03-019
THREAT:
Microsoft Windows Media Services is a feature of Microsoft Windows 2000 Server, Advanced Server, and Datacenter Server, and is also available as a downloadable version for Windows NT 4.0 Server. Windows Media Services provides support for a method of delivering media content to clients across a network known as multicast streaming. In multicast streaming, however, the server has no connection to or knowledge of the clients that may be receiving the stream coming from the server. To facilitate logging of client information for the server, Windows 2000 includes a capability that is specifically designed for that purpose. To help with this problem, Windows 2000 includes logging capabilities for multicast and unicast transmissions.

This capability is implemented as an Internet Services Application Programming Interface (ISAPI) extension nsiislog.dll. When Windows Media Services are installed in Windows NT 4.0 Server or added through add/remove programs to Windows 2000, nsiislog.dll is installed to the Internet Information Services (IIS) Scripts directory on the server.

There is a flaw in the way in which nsiislog.dll processes incoming requests. A vulnerability exists because an attacker may send specially formed communications to the server. This may cause IIS to stop responding to Internet requests or execute attacker's code on the host.

IMPACT:
This vulnerability may be exploited to cause a denial of service condition with IIS, or run an attacker's code on the host.
SOLUTION:
Microsoft has released a patch for this vulnerability. For information, see Microsoft Security Bulletin MS03-019.
RESULT:
No results available
QID:86196   Category:Web server   CVE ID:CVE-2001-0507
Vendor Reference:MS01-044
THREAT:
For performance reasons, Microsoft Internet Information Server (IIS) Version 5.0 supports the ability to run certain executables 'in-process' when requested remotely.

When executables run 'in-process', they run as part of the main IIS process. It's important to restrict which executables can run 'in-process' because as part of the main IIS process, they execute in the Local System security context.

IIS Version 5.0 ships with a table of executables that will run 'in-process' when requested remotely by a Web client. Even though all of these binaries are shipped with IIS, they are listed in the table using relative paths. A user who can create files on an IIS server can place an executable on the Web root filesystem with a relative path and filename that matches an entry in the table. When the executable is requested, the path and filename match causes it to be executed 'in-process'. The executable may provide administrative access to the unprivileged user.

By default, unprivileged users do not have permission to upload content to an IIS server.

IMPACT:
Any local user who has write access to the Web root can gain &amp;quot;Local System&amp;quot; (administrative) privileges.

This bug may also be exploited remotely in the unlikely event that a remote user has managed to get write access to the Web site. Note, however, that such a remote user would already (and without this bug) be able to change the Web site content, leading to a possible defacement of the site, or be able to place custom CGI scripts on the site, leading to arbitrary code execution on the server.

Note: As with any local security hole, TreutlerGuard cannot perform active testing to determine whether or not your machine is vulnerable. Therefore, if you have already applied the appropriate patch, you can safely ignore this warning.

SOLUTION:
Microsoft Security Bulletin MS01-044 contains information about a cumulative patch for IIS that, amongst other things, fixes this bug.
RESULT:
No results available
QID:86196   Category:Web server   CVE ID:CVE-2001-0507
Vendor Reference:MS01-044
THREAT:
For performance reasons, Microsoft Internet Information Server (IIS) Version 5.0 supports the ability to run certain executables 'in-process' when requested remotely.

When executables run 'in-process', they run as part of the main IIS process. It's important to restrict which executables can run 'in-process' because as part of the main IIS process, they execute in the Local System security context.

IIS Version 5.0 ships with a table of executables that will run 'in-process' when requested remotely by a Web client. Even though all of these binaries are shipped with IIS, they are listed in the table using relative paths. A user who can create files on an IIS server can place an executable on the Web root filesystem with a relative path and filename that matches an entry in the table. When the executable is requested, the path and filename match causes it to be executed 'in-process'. The executable may provide administrative access to the unprivileged user.

By default, unprivileged users do not have permission to upload content to an IIS server.

IMPACT:
Any local user who has write access to the Web root can gain &amp;quot;Local System&amp;quot; (administrative) privileges.

This bug may also be exploited remotely in the unlikely event that a remote user has managed to get write access to the Web site. Note, however, that such a remote user would already (and without this bug) be able to change the Web site content, leading to a possible defacement of the site, or be able to place custom CGI scripts on the site, leading to arbitrary code execution on the server.

Note: As with any local security hole, TreutlerGuard cannot perform active testing to determine whether or not your machine is vulnerable. Therefore, if you have already applied the appropriate patch, you can safely ignore this warning.

SOLUTION:
Microsoft Security Bulletin MS01-044 contains information about a cumulative patch for IIS that, amongst other things, fixes this bug.
RESULT:
No results available
QID:70023   Category:SMB / NETBIOS   CVE ID:CAN-2002-0724
Vendor Reference:MS02-045
THREAT:
Microsoft Windows operating systems use the Server Message Block (SMB) protocol to support services such as file and printer sharing. A buffer overflow vulnerability has been reporting in the handling of some malformed SMB requests.

To exploit this vulnerability, a remote malicious able to connect to a vulnerable system could send a specially constructed SMB request packet. It may be possible to corrupt sensitive process memory to cause the underlying system to crash. If this occurs, then a reboot is required in order to regain normal functionality.

IMPACT:
Due to the nature of this vulnerability, it is possible that careful exploitation could lead to the execution of arbitrary code. In this case, a malicious user could gain local access to the vulnerable system, possibly with privileges. However, the ability to execute arbitrary code through exploitation of this issue has not yet been confirmed.

This vulnerability may be exploited both as an authenticated user, and with anonymous access to the service.

SOLUTION:
For more information and to obtain patches, read Microsoft Security Bulletin MS02-045.
RESULT:
Windows 2000 LAN Manager
QID:74099   Category:Mail services   CVE ID:CVE-2002-0054
Vendor Reference:N/A  
THREAT:
A vulnerability was reported in the Microsoft Windows 2000 SMTP service and Microsoft Exchange Server 5.5 Internet Mail Connector service. This issue may allow a malicious user to gain unauthorized user-level access to the SMTP service on a vulnerable host.

A flaw exists in the way that the Windows 2000 SMTP service and Microsoft Exchange Server 5.5 interact with the NTLM authentication layer. Due to a failure of these services to perform adequate checks, it may be possible for a user who has authenticated via the NTLM authentication layer to gain unauthorized access to the SMTP service itself with the privileges of a non-administrative user.

The expected behavior is that users can only access the SMTP service if privileges were explicitly given to them.

IMPACT:
If this vulnerability is successfully exploited, malicious users can potentially turn the server into a mail relay.
SOLUTION:
Microsoft released the following fixes to address this issue. The fix for Microsoft Windows 2000 will be incorporated into Service Pack 3.

If you are running Microsoft Windows 2000 Advanced Server 0.0SP2, Microsoft Windows 2000 Server 0.0SP2, or Microsoft Windows 2000 Professional 0.0SP2, then apply the following patch:
Microsoft Patch Q313450_W2K_SP3_X86_EN.exe

If you are running Microsoft Exchange Server 5.5 Service Pack 4, then apply the following patch:
Microsoft Patch Q289258engi386.EXE

RESULT:
220 demo02 Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Wed, 7 Sep 2005 00:17:36
-0700
QID:86377   Category:Web server   CVE ID:CAN-2000-1147
Vendor Reference:Q274149
THREAT:
The ASP ISAPI file parser does not properly execute malformed ASP files that contain scripts with the LANGUAGE parameter containing a buffer of over 2200 characters, and the RUNAT value set as 'server'. Depending on the data entered into the buffer, a denial of service attack could be launched or arbitrary code could be executed under the SYSTEM privilege level in the event that a malicious ASP file were locally executed on IIS.
IMPACT:
By exploiting this issue, a malicious user could launch a denial of service attack or execute arbitrary code.
SOLUTION:
This issue has been resolved by a number of Microsoft IIS patches. Select the link below to download a patch from Microsoft to eliminate this vulnerability: http://download.microsoft.com/download/winntsp/Patch/Q274149/NT4/EN-US/secsesi.exe
RESULT:
No results available
QID:86530   Category:Web server   CVE ID:CAN-2003-0226
Vendor Reference:MS03-018
THREAT:
A denial of service vulnerability has been reported for Microsoft IIS 5 and 5.1. The vulnerability is related to how WebDAV requests are handled by IIS. WebDAV (Web-based Distributed Authoring and Versioning) is a set of HTTP extensions that allows multiple users to edit and manage files on remote Web servers.

Specifically, when the WebDAV "PROPFIND" and "SEARCH" methods receive a request containing more than 49,153 bytes, the IIS service will fail. This occurs because the unusually long request causes the error handling for XML requests to occur out of sequence.

IMPACT:
When this vulnerability is successfully exploited, IIS 5.0 and 5.1 will automatically restart and normal operation will resume. However, during failure and restart all current Web, FTP, and email connections to the server will be terminated and new connections will not be established until after the service has restarted.
SOLUTION:
Microsoft has released a patch to fix this vulnerability. For information, see Microsoft Security Bulletin MS03-018.

This patch also addresses these vulnerabilities:
- Redirection Cross Site Scripting (CAN-2003-0223)
- Server Side Include Web Pages Buffer Overrun (CAN-2003-0224)
- ASP Headers Denial of Service (CAN-2003-0225)

Important note: Apply the patch for MS03-018 after applying the patch for Microsoft Security Bulletin MS02-050. If you do not apply the patch for MS02-050 first, the patch for MS03-018 will cause client-side certificates to be rejected.

Workaround:

1. Completely disable WebDAV by setting the value of the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW3SVCParametersDisableWebDAV registry key to 1.

2. Limit the length of requests (the url and any headers) by setting the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesw3svcparameters MaxClientRequestBuffer to something like 16k.

3. Block the following WebDAV HTTP verbs using URLScan (either by specifically blocking them or by not listing them as allowed): OPTIONS, PROPFIND, PROPPATCH, MKCOL, DELETE, PUT, COPY, MOVE, LOCK, UNLOCK, OPTIONS, and SEARCH. Note that FrontPage does require the OPTIONS method to work properly.

4. Block the following WebDAV-related headers using the [DenyHeaders] section of URLScan.ini:
[DenyHeaders]
DAV:
Depth:
Destination:
If:
Label:
Lock-Token:
Overwrite:
TimeOut:
TimeType:
DAVTimeOutVal:
Other:
Translate:

5. If you require WebDAV, you can limit the length of each individual header with these entries in the [RequestLimits] section (the exact values are obviously pretty generic and may need to be increased or decreased based on your particular configuration):
[RequestLimits]
Max-DAV=250
Max-Depth=250
Max-Destination=250
Max-If=250
Max-Label=250
Max-Lock-Token=250
Max-Overwrite=250
Max-TimeOut=250
Max-TimeType=250
Max-DAVTimeOutVal=250
Max-Other=250
Max-Translate=250

RESULT:
No results available
QID:10751   Category:CGI   CVE ID:CVE-2002-0364
Vendor Reference:MS02-028
THREAT:
A heap overflow condition in the 'chunked encoding transfer mechanism' related to the ISAPI HTR extension has been discovered in Microsoft IIS (Internet Information Services).

This condition is due to an unchecked buffer, which is dynamically allocated by the ISAPI extension that implements HTR. HTR scripting has largely been abandoned in favor of ASP (Active Server Pages). This vulnerability is only a problem on systems that have the HTR ISAPI filter enabled.

This vulnerability affects IIS 4.0 and IIS 5.0. Exploitation of this vulnerability may result in a denial of service or allow for a remote attacker to execute arbitrary instructions on the victim host. An attacker can possibly initiate a malicious session capable of overwriting static global variables, stored function pointers, process management structures, memory management structures, and other data types with attacker-supplied instructions.

On IIS 4.0, arbitrary code execution may result in a full compromise. On IIS 5.0, this issue may allow an attacker to gain fewer yet still significant privileges.

This vulnerability is similar to the issue described in Bugtraq ID 4485 and Microsoft Security Bulletin MS02-018. The difference is that this issue specifically affects the HTR ISAPI extension.

IMPACT:
An attacker can possibly initiate a malicious session capable of overwriting static global variables, stored function pointers, process management structures, memory management structures, and other data types with attacker-supplied instructions.
SOLUTION:
Microsoft has released patches to address this issue. For more information and download instructions for the patches, read Microsoft Security Bulletin MS02-028.
RESULT:
No results available
QID:19060   Category:Database   CVE ID:CAN-2000-1081 CAN-2001-0542 CAN-2002-0056 CAN-2002-0154
Vendor Reference:MS00-092
THREAT:
MS-SQL-8 Database Server was detected on this host. We can remotely detect the presence of Microsoft's SQL Server, but cannot remotely detect if a patch or service pack has already been applied. Verify that you have applied the appropriate patch and/or service pack.

The following threats are present in Microsoft SQL Server 8 (MS-SQL-8):

1) Microsoft SQL Server/Data Engine various xp_ Buffer Overflow Vulnerabilities. The API Srv_paraminfo() function is implemented by Extended Stored Procedures (XPs). XPs are DLL files that perform high-level functions. When called, they invoke a function called Srv_paraminfo(), which parses the input parameters. Srv_paraminfo() does not check the length of the parameter string that an XP passes to it. The following XPs are affected: xp_displayparamstmt, xp_enumresultset, xp_showcolv, xp_updatecolvbm, xp_peekqueue, xp_printstatements, xp_proxiedmetadata and xp_SetSQLSecurity.

2) Microsoft SQL Server Multiple Overflow and Format String Vulnerabilities. SQL Server provides built-in functions for the formatting of error messages based on C-style format specifiers. These built-in functions are accessible to all users. Providing specially-crafted input to these functions results in exploitable error conditions in the SQL Server process. To mount this attack, the malicious user must have permission to execute SQL queries either directly or by leveraging SQL Command Injection flaws.

3) Microsoft SQL Server Provider Name Buffer Overflow Vulnerability . SQL Server does not perform proper bounds checking of the provider arguments to the OpenDataSource and OpenRowset functions. These functions may be used by an ordinary user to reference OLE DB data sources. As a result, it's possible to cause a buffer overflow condition to occur by providing an excessively long string as a provider name in a query.

4) Microsoft SQL Server xp_dirtree Buffer Overflow Vulnerability . A vulnerability has been reported in the xp_dirtree function. If an extremely large parameter is passed to the stored procedure xp_dirtree, a buffer overflow condition will occur. This issue may be related to an older known problem with unsafe usage of the Srv_paraminfo() function call. This issue is discussed in BIDs 2030, 2031, 2038, 2039, 2040, 2041, 2042, and 2043. This relationship has not been confirmed.

5) Microsoft SQL Server Administrator Cached Connection Vulnerability. Query methods are SQL Server commands used to request information from the database. A flaw exists in the handling of specially-structured ad hoc queries, which could enable a normal user to gain administrative privileges. In order to gain access to information in the database, a user must make a connection to the server. Once access to the database is no longer required, the user logging off will terminate the connection. However, by design SQL Server will store the connection used by the user in cache for a certain amount of time. This is done to improve the server's performance. Next time that particular user logs in, SQL Server can reinstate the cached connection rather than creating a new one.

6) Microsoft SQL Server SQLXML Script Injection Vulnerability. SQLXML is a component that enables SQL servers to receive and send database queries via XML format. Such queries can be sent using various methods of communication, one of which is via HTTP. SQLXML HTTP components reside in a virtual directory on a Web server and are not enabled by default. It is possible to include script code in an XML database request via the Root parameter, and as a result SQLXML would include the attacker's script in the response. When the response is rendered by a Web browser, the attacker's script will execute.

IMPACT:
1) This vulnerability can only be exploited by users who can successfully log into the SQL server. By exploiting this vulnerability, it may be possible for malicious users to execute arbitrary code on the host running a vulnerable version of SQL Server. The malicious user would need to overwrite the return address of the calling function with the address of attacker-supplied shell code in memory. This shell code would be executed under the context of the account that the SQL Server service was configured to run under. The account must have a minimum of SYSTEM privileges.

2) By exploiting this vulnerability, it may be possible for malicious users to execute arbitrary code on a host running a vulnerable version of Microsoft's SQL Server.

3) Successful exploitation of this vulnerability could allow a malicious user to execute arbitrary code with the privileges of the database. There is a possibility that this issue may be exploited remotely, either via distributed SQL queries or potentially via an SQL injection attack.

4) If an extremely large parameter is passed to a vulnerable stored procedure, a buffer overflow condition will occur. Depending on the data supplied, this could cause a denial of service condition, or result in the execution of arbitrary code as the SQL Server process.

5) By exploiting this vulnerability, logged-in users can gain administrative privileges to the database.

6) It's possible, under some circumstances, to inject arbitrary script code via XML tags. This may allow an attacker to execute script code in the context of the Internet Explorer Security Zone associated with the IIS server running the vulnerable components. This may result in a malicious script running with a higher privilege, such as in the context of the Intranet Zone.

SOLUTION:
1) Read Microsoft Security Bulletin MS00-092: Frequently Asked Questions for more information about this vulnerability and for instructions on how to download and install the patches.

2) Microsoft released the following fix for SQL Server 2000 SP2: Microsoft Patch Q316333.

3) Microsoft released the following fix for SQL Server 2000 SP2: Microsoft Patch Q316333.

4) Microsoft released the following fix for SQL Server 2000 SP1, and SQL Server 2000: Microsoft Patch Q299717.

5) Microsoft released patches to fix this issue. Download a patch from the Microsoft SQL Web site.

If you are using Veritas' BackUp Exec, follow these recommandations.

We recommend upgrading to the latest SQL Server Service Pack which is SP4. Please refer the Microsoft SQL Server Product Page for more details and instructions on downloading and installing the latest Service Pack.

RESULT:
ServerName DEMO02
InstanceName MSSQLSERVER
IsClustered No
Version 8.00.194
tcp 1433
np \\DEMO02\pipe\sql\query

QID:19061   Category:Database   CVE ID:N/A  
Vendor Reference:MS02-034
THREAT:
MS-SQL-8 Database Server was detected on this host. We can remotely detect the presence of Microsoft's SQL Server, but cannot remotely detect if a patch or service pack has already been applied. Verify that you have applied the appropriate patch and/or service pack.

The following threats are present in MS-SQL-8:

1) Microsoft SQL Server SQLXML Buffer Overflow Vulnerability. SQLXML is a component that enables SQL servers to receive and send database queries via XML format. Such queries can be sent using various methods of communication, one of which is via HTTP. SQLXML HTTP components reside in a virtual directory on a Web server and are not enabled by default. SQLXML ISAPI extensions run with LocalSystem privileges. It is possible for a user to initiate the overflow by connecting to a host via HTTP and submitting malformed data directly to the SQLXML HTTP component.

2) Microsoft SQL Server 2000 PWDEncrypt Buffer Overflow Vulnerability. This vulnerability is due to insufficient bounds checking of data supplied to the built-in pwdencrypt() hashing function. The attacker must be able to execute a database query using the pwdencrypt() function to exploit this vulnerability, which implies that the attacker must either have legitimate access to the database server or obtain unauthorized access through some other means. For example, it may be possible to exploit this issue via an SQL injection attack in another application.

3) Multiple Microsoft SQLServer 2000 Vulnerabilities. The first buffer overrun condition exists in the procedure used to encrypt SQL Server credential information. If a parameter passed to the procedure from within a query is of excessive length, the overrun occurs.

The second buffer overrun condition is related to the "bulk-input" feature. This feature allows administrators to import data into a database table or view directly from data files with a custom format. Attackers may exploit this vulnerability by invoking a bulk input procedure with maliciously constructed arguments.

By default, the permissions of the registry key used to specify the account used by the SQL server process are insecure. Through SQL queries, the key may be modified without administrative privileges.

4) Microsoft SQL Server Installation Password Caching Vulnerability. During the initial installation of SQL Server 2000, or the installation of service packs, information is gathered and stored in a special file, setup.iss, which may contain passwords supplied during the installation process. The log file documenting the installation process will also contain passwords entered. The passwords are first encrypted and then stored. A Microsoft released bulletin notes that the encryption may be weak. During the installation process, passwords may be stored in either of the following two cases:

  • If the SQL Server is being set up in "Mixed Mode", a password for the SQL Server administrator (the ?sa? account) must be supplied.
  • Whether in Mixed Mode or Windows Authentication Mode, a User ID and password can optionally be supplied for the purpose of starting up SQL Server service accounts.

5) Microsoft SQL Server 2000 Database Consistency Checkers Buffer Overflow Vulnerability. SQL Server and Microsoft Desktop Engine ship with Database Consistency Checkers (DBCCs). Several of the DBCCs contain identical buffer overflow vulnerabilities in areas of the code that handle user input. Most DBCCs can only be executed by database administrator users, however, users who have been assigned either the 'db_owners' or 'db_ddladmin' fixed server roles can also execute one or more of these DBCCs.

IMPACT:
1) Malformed data could be used to overwrite stack variables, including the return address, possibly to execute arbitrary code. Malicious users may also crash the service by sending excessive amounts of data.

2) This vulnerability may be exploited to execute arbitrary instructions as the SQL Server.

3) Two of the vulnerabilities are buffer overrun conditions that may result in the execution of code supplied by remote attackers. The buffer overrun condition related to the "bulk-input" feature is mitigated by the default access restrictions on the bulk input procedure. Only members of the "Bulk Administrators" group may run the vulnerable procedure. The final vulnerability is due to a weak default configuration that could allow attackers to change the user account of the SQL Server process. If the server has been configured to run with non-administrative privileges, an attacker may exploit this vulnerability to configure the server so that it runs with higher privileges when it is next started.

4) If exploited by a malicious user, passwords stored in setup.iss, which are supplied during the installation process, may be stolen.

5) Successfully exploiting this vulnerability could lead to arbitrary code execution with the privilege level of the SQL Server service account.

SOLUTION:
1) A patch can be downloaded from the Microsoft SQL Web site.

2) Read Microsoft Security Bulletin MS02-034 for more information about these vulnerabilities and for instructions for obtaining a patch.

3) Microsoft has stated that SQL Server 7.0 is not affected by any of the reported vulnerabilities. Microsoft has released a patch for SQL Server 2000 SP2. It will be included in SP3. Check Microsoft's Download site for updates.

4) Microsoft has provided a utility, killpwd.exe, which will remove the passwords from any accessible directories. Check Microsoft's Download site for updates.

5) Microsoft has released a patch to address this vulnerability. Check Microsoft's Download site for updates.

We recommend upgrading to the latest SQL Server Service Pack which is SP4. Please refer the Microsoft SQL Server Product Page for more details and instructions on downloading and installing the latest Service Pack.

RESULT:
ServerName DEMO02
InstanceName MSSQLSERVER
IsClustered No
Version 8.00.194
tcp 1433
np \\DEMO02\pipe\sql\query

QID:19062   Category:Database   CVE ID:CAN-2002-0645 CVE-2002-0650 CAN-2002-0649
Vendor Reference:MS02-043
THREAT:
MS-SQL-8 Database Server was detected on this host. We can remotely detect the presence of Microsoft's SQL Server, but cannot remotely detect if a patch or service pack has already been applied. Verify that you have applied the appropriate patch and/or service pack.

The following threats are present in MS-SQL-8:

1) Microsoft SQL Server 2000 Replication Stored Procedures Injection Vulnerability. It's possible to inject operating system commands into the SQL Server database due to a vulnerability in two stored procedures used during replication. These stored procedures do not validate input passed to them, thus allowing a user to inject custom SQL and potentially operating system commands.

2) Microsoft SQL Server 2000 Resolution Service Denial of Service Vulnerability. SQL Server 2000 uses a keep-alive mechanism that operates through the Resolution Service. If the keep-alive function receives a specially-crafted data packet, it will reply with an identical packet. Therefore, if one SQL Server sends a data packet that was specially crafted to another SQL Server's keep-alive function, the second SQL Server would respond with an identical packet, causing the two servers to enter an endless loop.

3) Microsoft SQL Server 2000 Resolution Service Stack Overflow and Heap Overflow Vulnerability. A stack-based and heap-based overflow in the resolution service could be exploited by a malicious user by sending specially-crafted UDP packets to port 1434. If the packet consists of data not specifically designed to cause code execution, a denial of service may result.

4) Microsoft SQL Server Remote Buffer Overflow Vulnerability. This vulnerability allegedly occurs even before authentication can proceed. Reportedly, this is due to a default system configuration. Microsoft SQL Server listens for connections on TCP port 1433. An attacker can exploit this vulnerability by sending specially crafted packets to TCP port 1433 which causes SQL Server to crash and possibly execute attacker supplied code.

5) Microsoft SQL MS Jet Engine Unicode Buffer Overflow Vulnerability. This condition occurs when the OpenDataSource function is used with MS Jet Engine. The OpenDataSource function is used for referencing heterogeneous OLE DB data sources in Transact-SQL statements. Microsoft Jet Engine is the database engine for Microsoft SQL Server. This condition may be triggered if an overly long string is passed to the Microsoft Jet Engine component via the OpenDataSource function.

6) Microsoft SQL Agent Jobs Privilege Elevation Vulnerability. SQL Server 2000 uses an Agent, which is responsible for restarting the SQL Server service, replication, and running scheduled jobs. Some of the jobs supplied by Microsoft as stored procedures on the SQL Server contain weak permissions. The following procedures are affected: sp_add_job, sp_add_jobstep, sp_add_jobserver, and sp_start_job.

The Agent typically runs in the security context of the SQL Server Service Account. Under normal circumstances, when a T-SQL job is submitted to the Agent, it will drop its privilege level by performing the following command: SETUSER N'guest' WITH NORESET. This can be bypassed by causing the Agent to reconnect after it has performed the privilege lowering command.

7) Microsoft SQL Server Extended Stored Procedure Privilege Elevation Vulnerability. Some of the extended stored procedures contain weak permissions. The extended stored procedures typically connect to the database in the security context of the SQL Server Service Account. A user with low privileges could pass certain arguments to the vulnerable extended stored procedures, allowing them to perform actions on the database in the security context of the SQL Server Service Account.

IMPACT:
1) The exploitation of this vulnerability could enable a malicious user to inject custom SQL and operating system commands. One of the two stored procedures can only be accessed by users who are database administrators or are members of the 'db_owner' fixed database role. The other stored procedure should require the same level of privileges, but due to an error in the permissions, it can be accessed by any user that can log into the server interactively. This vulnerability can only be exploited if the SQL Server administrator has enabled the SQL Server Agent Proxy account.

2) When this vulnerability is exploited, both servers will eventually consume all available resources, resulting in a denial of service condition. It is important to note that an SQL Server will never send the particular packet needed to exploit this vulnerability to another SQL Server under normal operating conditions. An attacker would have to send one SQL Server the packet with a spoofed source address belonging to a second SQL Server.

3) It may be possible to craft the exploit code to execute arbitrary instructions in the security context of the SQL server. This may provide a remote malicious user with local access to the underlying host.

4) The nature of these issues suggests that memory corruption may be occurring. If that is the case, it is possible that these issues may be remotely exploitable to execute arbitrary code as a system process, possibly leading to local access to the vulnerable system.

5) This issue may be exploited to execute attacker-supplied instructions with the privileges of the SQL Server process. If the SQL Server process is running in the SYSTEM context, this may lead to a full compromise. This issue requires that the attacker is capable of passing maliciously crafted data to the OpenDataSource function. Under normal circumstances, this would require the attacker to have access to the database server. However, this may be exploitable remotely via SQL injection vulnerabilities in any Web-based software that accesses a vulnerable database. Due to this being an issue in the MS Jet Engine component itself, other products that rely on Jet Engine may also be affected by this vulnerability.

6) A malicious user can achieve this using the extended stored procedures discussed in the Microsoft SQL Server Extended Stored Procedure Privilege Elevation Vulnerability. By exploiting this vulnerability, a malicious user would be able to execute other extended stored procedures, such as xp_cmdshell, on the SQL Server with the security context of the SQL Server Service Account.

7) The vulnerability could also be exploited by an attacker visiting a Web site that uses one of these extended stored procedures as part of a search engine for the database. The database-driven Web application would need to be prone to existing input validation vulnerabilities for this type of exploitation to occur. If this vulnerability is exploited, a user with low privileges may perform actions on the database in the security context of the SQL Server Service Account.

SOLUTION:
For vulnerabilities 1), 2), and 3), Microsoft has released patches to address these issues. Check Microsoft's Download site for updates.

4) No solution is available at this time. Check for upgrades at Microsoft's Download site.

5) Microsoft advises affected users to obtain the latest version of Microsoft Jet Engine from Microsoft Knowledge Base Article Q282010.

6) It is not currently clear if this issue was addressed in Microsoft Security Bulletin MS02-043. However, applying the patch for that issue will significantly mitigate potential exploitation of this vulnerability by preventing attackers from using the vulnerable extended stored procedures to cause the SQL Server Agent to reconnect to the database with a higher privilege level. The bulletin includes instructions for obtaining the patch. Check for upgrades at Microsoft's Download site.

7) Microsoft has released the following patch for SQL Server 2000: Patch Q316333

We recommend upgrading to the latest SQL Server Service Pack which is SP4. Please refer the Microsoft SQL Server Product Page for more details and instructions on downloading and installing the latest Service Pack.

RESULT:
ServerName DEMO02
InstanceName MSSQLSERVER
IsClustered No
Version 8.00.194
tcp 1433
np \\DEMO02\pipe\sql\query

QID:90060   Category:Windows   CVE ID:CVE-2001-0014
Vendor Reference:MS01-006
THREAT:

Note: You are only vulnerable if you run Windows 2000 and didn't patch your server against this vulnerability.

Remote Desktop Protocol (RDP) enables remote users to communicate through applications over the network using keystrokes and mouse-clicks. Windows 2000 Server and Advanced Server are subject to a denial of service condition. Submitting multiple malformed packets to the RDP services port will cause the server to crash, and any unsaved data will be lost.

IMPACT:

As a result of this vulnerability being exploited, the Terminal Server application will stop responding. Therefore, you must manually restart the server in order to regain normal functionality. Other processes running on the Windows 2000 Server will continue to work normally.

Malicious users could also use the denial of service condition to assist them in further attack against this host.

SOLUTION:
Microsoft released Patch Q286132_W2K_SP2 to fix this issue.
RESULT:
Detected service win_remote_desktop and os WINDOWS 2000
QID:90057   Category:Windows   CVE ID:CVE-2001-0540
Vendor Reference:N/A  
THREAT:

Microsoft Windows Terminal Server centralizes management of user applications for each client connected to the server. User applications and desktops are transmitted over the network and displayed via a terminal emulation program.

Due to a flaw in the Microsoft Terminal Server service, it's possible for a host to be led to consume all available memory resources. This behavior is the result of flaws in the server's memory management.

Malformed data packets submitted repeatedly to an affected host on port 3389 will result in the accumulation of allocated memory that is not freed after use. It's possible to exhaust the memory resources of the target system, potentially impacting the Terminal service, as well as other applications running on the affected host.

IMPACT:
If you haven't already applied the appropriate patch (see the Solution field below), then it's possible for a malicious Internet user to launch a denial of service against your server by exhausting the memory, preventing all the applications and services present on the machine from working until the server is rebooted.
SOLUTION:
Microsoft released several patches to fix this problem. For information on which patch is relevant to your particular configuration, read Microsoft Security Bulletin MS01-40.

Note: Microsoft Windows Terminal Server contains another Denial of Service vulnerability. For information on this issue, read Microsoft Security Bulletin MS01-006.

RESULT:
Detected service win_remote_desktop and os WINDOWS 2000
QID:82037   Category:TCP/IP   CVE ID:CVE-2002-0597
Vendor Reference:N/A  
THREAT:
An issue has been discovered in Windows 2000, which could result in a denial of system services.

Submitting malformed data to port 445 could cause the Lanman service to consume high CPU and Kernel mode memory usage.

IMPACT:
If a denial of service occurs, a restart of the server may be required in order to regain normal functionality. Reports indicate that in extreme cases administrators may receive the following error message: "You do not have permissions to shutdown or restart this computer."
SOLUTION:
Microsoft has provided the following two workarounds:

IMPORTANT: The configuration in the first method may not be supported in an environment where programs that require NetBIOS support are being used.

Method 1: Disable NetBIOS over TCP/IP (which also disables port 445).

  1. Go to Start-->Settings-->Network and Dial-up Connections.
  2. Right-click Local Area Connection, and select Properties.
  3. Select Internet Protocol (TCP/IP), and click Properties.
  4. Click Advanced.
  5. Under the WINS tab, select the Disable NetBIOS over TCP/IP check box, and then click OK.

Method 2: Create and then set the MaxWorkItems value in the registry to a value that the computer can support.

  1. Start Registry Editor (Regedt32.exe).
  2. Locate the Parameters value under the following key in the registry:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer
  3. On the Edit menu, click Add Value, and type MaxWorkItems.
  4. Click REG_DWORD, and then click OK.
  5. Set the data to the one of the following:
    • 1024 for computers with a large amount of memory (greater than 2 gigabytes of memory)
    • 512 for computers with a medium amount of memory (512 megabytes to -2 gigabytes)
    • 256 for computers with a small amount of memory (less than 512 megabytes).
  6. Quit Registry Editor.
RESULT:
Detected service microsoft-ds and os WINDOWS 2000
QID:38129   Category:General remote services   CVE ID:CAN-2000-1079
Vendor Reference:N/A  
THREAT:
The implementation of the NetBIOS cache in Windows 95, 98, NT 4.0 and 2000 allows for remote insertion of dynamic cache entries and removal of both dynamic and static (from the LMHOSTS file) cache entries. This is due to the interaction between the implementation of the NetBIOS cache and the CIFS (Common Internet File System) Browser Protocol.

The CIFS Browser Protocol generates a list of network resources and is used in services such as My Neighborhood or My Network Places. It also defines a number of Browse Frames encapsulated within a NetBIOS datagram. Information contained in a NetBIOS datagram is extracted and inserted into the NetBIOS cache when a Browse Frame request is received on UDP port 138. This information includes a source and destination NetBIOS name, second source IP address, and IP headers.

A remote malicious user can transmit unicast or broadcast UDP datagrams, which can result in the redirection of NetBIOS name resolution to IP address resolution forwarding to an arbitrary IP address under their control. Once the cache is corrupted with a UDP datagram, it is no longer a prerequisite to predict Transaction IDs (which is reportedly an easily predictable 16-bit ID to begin with).

To flush a dynamic entry in the cache, one can send a Postive Name Query response that provides a different IP address to NetBIOS name mapping.

IMPACT:
By exploiting this vulnerability, a remote malicious user can transmit unicast or broadcast UDP datagrams, which can result in the redirection of NetBIOS name resolution to IP address resolution forwarding to an arbitrary IP address under their control.
SOLUTION:
We are not currently aware of any vendor-supplied patches for this issue.

Workarounds provided by COVERT Labs:

  1. If running Windows 2000, disable NetBIOS over TCP/IP.
  2. Block ports 135-139 and 445, both UDP and TCP, at your network perimeter to protect from external attackers.
  3. Because NetBIOS name resolution (either through broadcast or WINS) is subject to this cache corruption attack, it should not be relied upon to perform hostname to IP address resolution.
  4. Disable the "WINS Client" binding including the NetBIOS Interface, Server and Workstation services. It is important to disable all services that register a NetBIOS name as shown by nbtstat -n. Selectively unbinding the "NetBIOS interface" or other specific services such as Server or Workstation will still allow attackers to talk to a NetBIOS name and corrupt the NetBIOS cache.
  5. It is important to note the Computer Browser Service is independent of Browse Frame processing and generation (at least within the bounds of this vulnerability). Disabling the service has no impact upon this vulnerability.
RESULT:
No results available
QID:86099   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Microsoft's IIS Version 4.0 and 5.0 ASP pages send the same Session ID cookie for secure and insecure Web sessions. A remote unauthorized user may be able to hijack the secure Web session of a legitimate user. This is possible if the legitimate user moves to an insecure session. This is also known as the "Session ID Cookie Marking" vulnerability.

We do not perform active tests for this vulnerability; therefore, if you know that you've already applied the appropriate patch (see the Solution field below), you can safely disregard this notice.

IMPACT:
If successfully exploited, a remote unauthorized user may be able to hijack the secure web session of a legitimate user.
SOLUTION:
Microsoft released the following patches to resolve this issue:

Microsoft IIS Version 4.0 Update

Microsoft IIS Version 5.0 Update

RESULT:
No results available
QID:86139   Category:Web server   CVE ID:CVE-2000-0258
Vendor Reference:N/A  
THREAT:
Requesting a malformed URL containing numerous escaped characters will cause Microsoft IIS performance to dramatically decrease until the URL has been processed.
IMPACT:

Note: To avoid causing a denial of service on your server, we don't perform active tests for this vulnerability. Therefore, if you've already applied the appropriate patches, you can safely ignore this warning. (For information on patches, see the Solution field below.)

By sending multiple requests with a malformed URL (as described in the Description field), responsiveness of your Web server, and eventually other services on it, may decrease significantly.

SOLUTION:

For more information on this vulnerability, refer to Microsoft's Security Bulletin MS00-023.

A patch for Internet Information Server (IIS) Version 4.0 is available at the following location:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20292

A patch for Internet Information Server(IIS) Version 5.0 is available at the following location:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20286

RESULT:
No results available
QID:86158   Category:Web server   CVE ID:CVE-2000-0408
Vendor Reference:N/A  
THREAT:

Microsoft IIS Version 4.0 and Version 5.0 contain a denial of service vulnerability. If you've already applied the appropriate patch, then you can safely ignore this warning.

By sending a specially crafted URL containing malformed file extension information to Microsoft IIS Version 4.0 or 5.0, a malicious user can consume all CPU usage, which will halt the program's services.

IMPACT:
As a result, you must either restart the application or wait until the URL is processed in order to regain normal functionality.
SOLUTION:
Microsoft has released Patch Q260205 to fix this issue.
RESULT:
No results available
QID:19038   Category:Database   CVE ID:CAN-2002-0224
Vendor Reference:N/A  
THREAT:
The Microsoft Distributed Transaction Service Coordinator (MSDTC) allows for ditributed transaction processing in a clustered or distributed environment. It is installed by default on Windows 2000 Advanced and Datacenter Servers, as well as with Microsoft SQL Server 6.5 and higher.

It has been reported that it may be possible to cause this service to crash by sending 1024 bytes of random data to its listening port, port 3372 by default. On some systems, this may cause the service to crash immediately, while on those that fail to crash, larger data packets and multiple connections will have no effect.

Note: The existence of this vulnerability has not been confirmed by Microsoft.

IMPACT:
The exploitation of this vulnerability could lead to a denial of service, which would require a restart of the service in order to resume normal operation.
SOLUTION:
There is no solution available at this time.
RESULT:
ServerName DEMO02
InstanceName MSSQLSERVER
IsClustered No
Version 8.00.194
tcp 1433
np \\DEMO02\pipe\sql\query

QID:68500   Category:RPC   CVE ID:CAN-2001-0509
Vendor Reference:N/A  
THREAT:

DCE/RPC is a proprietary protocol developed by Microsoft, and serves the same purpose as Unix RPC (Remote Procedure Call). It allows a computer to remotely call procedures on another machine. Like Unix RPC, Microsoft RPC makes use of an Interface Definition Language, which is used to generate a skeleton program (for the server side) and a stub program (for the client side).

The skeleton program makes sure that procedure arguments are properly typed before passing them to the procedure implementation. The implementation checks that the argument values are correct (for example, an integer may have the right type but have a value outside the allowed range). Many RPC implementers fail to perform this check correctly. Therefore, an attacker that sends garbage (i.e. zero filled packets) to an RPC port, may cause unpredictable behavior of the associated RPC service.

IMPACT:

It seems that Windows RPC is enabled on this machine. By exploiting this vulnerability an attacker can either perform a Denial of Service attack by causing the system or key services to crash or may run arbitrary code on the compromised host.

SOLUTION:
If you are running any of these deamons or windows version : Microsoft Exchange 5.5, Microsoft Exchange 2000, Microsoft SQL Server 7.0, Microsoft SQL Server 2000, Microsoft Windows NT 4.0, Microsoft Windows 2000 you should check the relevant patches, at Microsoft's Security Bulletin MS01-041.

As a workaround, you can filter RPC ports at the firewall level.

RESULT:
MSRPC Port
1025
1034
1026
QID:90003   Category:Windows   CVE ID:CVE-2001-0083
Vendor Reference:N/A  
THREAT:
Microsoft Windows Media Services is the server-side component of Windows Media Technologies, which provides streaming video and audio content capabilities. It is divided into two types of services, Unicast and Multicast. Windows Media Unicast Services supply media content to one client at a time, whereas Multicast Services serve multiple clients simultaneously. This vulnerability only applies to Windows Media Unicast Services.

In the event that a client establishes a connection and then stops it abruptly in a particular fashion, Windows Media Services will not release the resources it allocated to that particular client. If Windows Media Services were to receive these connections repeatedly, resources would become depleted and diminish to such a level that Windows Media Services would no longer be able to properly service clients.

IMPACT:
As a result of this vulnerability being exploited, a restart of the service is required in order to regain normal functionality, and all clients being serviced at the time would have to reestablish their connections.
SOLUTION:
For more information on this vulnerability, refer to Microsoft Security Bulletin MS00-097.

Microsoft released the following patch for Microsoft Windows Media Services Version 4.0 and Version 4.1:
Microsoft patch WMSU35924

RESULT:
4.1.0.3920
QID:90067   Category:Windows   CVE ID:CAN-2003-0661
Vendor Reference:MS03-034
THREAT:
A weakness has been reported in NetBIOS on Microsoft Windows operating systems that may enable remote attackers to gain access to potentially sensitive information. In particular, the NetBIOS Name Service may leak random memory contents when replying to NetBT Name Service requests.

The source of this issue is a flaw in how NetBT pads datagrams. A larger buffer is allocated than is needed when NetBIOS is generating a Name Service reply, and this buffer is not adequately initialized before the reply is generated. As a result, the reply may contain random fragments of system memory, some of which could potentially contain sensitive information. It is reported that the amount of padding that is required to cause minute amounts of memory to be disclosed will normally be 15 bytes or less. This amount will be derived from a previous memory operation. The expected behavior is for the datagram padding to be blank.

IMPACT:
This vulnerability may be exploited to obtain sensitive information about the host.
SOLUTION:
Microsoft has released a patch to address this issue. The patch and current information on this vulnerability can be obtained from Microsoft Security Bulletin MS03-034.

If you do not want to apply the patch, a workaround is to restrict access to UDP port 137.

RESULT:
Detected service netbios_ns and os Windows 2000
QID:45031   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Security Accounts Manager holds user and machine account information. The scanner found at least one user or machine account in the SAM database for the target Windows machine whose password does not expire. The accounts are listed in the Result section.
RESULT:
User/Machine Accounts With Passwords That Do Not Expire:
Administrator Guest IUSR_DEMO02 IWAM_DEMO02 NetShowServices
scanner TsInternetUser
QID:70004   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The following bindings were detected on this computer. Bindings have many purposes. They reflect such things as users logged-in, registration of a user name, registration of a service in a domain, and registering of a NetBIOS name.
IMPACT:
Unauthorized users can use this information in further attacks against the host. A list of logged-in users on the target host/network can potentially be used to launch social engineering attacks.
SOLUTION:
This service uses the UDP and TCP port 137. Typically, this port should not be accessible to external networks, and should be firewalled.
RESULT:
NameService
..__MSBROWSE__.Master Browser
DEMO02File Server Service
DEMO02Workstation Service
INet~ServicesDomain Controllers
IS~DEMO02IIS
WORKGROUPMaster Browser
WORKGROUPDomain Name
WORKGROUPBrowser Service Elections
QID:70030   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The following NetBIOS shared folders have been detected.
RESULT:
Device NameCommentTypeLabelSizeDescription
IPC$Remote IPC3   
ADMIN$Remote Admin0   
C$Default share0   
QID:12049   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The scanner enumerated the ISAPI filters mapped to the target Microsoft Internet Information Services (IIS) Web server's home directory "/". These are listed in the Result section below.
IMPACT:
Most of the ISAPI filters come by default with IIS, and typically most of them are never used in Web applications. Further, there have been quite a few buffer overflow based remote code execution or denial of service attacks reported for many of these ISAPI filters.
SOLUTION:
Disable the ISAPI filters not being used on the target. This can be done using the "Internet Information Services" MMC snap-in's "Home Directory" section (under "Configuration").
Microsoft provides a free tool named LockDown to secure IIS. LockDown is available at : http://www.microsoft.com/technet/security/tools/locktool.mspx.
RESULT:
.idq,.stm,.shtml,.shtm,.printer,.ida,
QID:45026   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This check probes the SAM database on the target host for password policy information. Information gathered is:

Minimum Password Age in Days
Maximum Password Age in Days
Minimum Password Length in Characters
Password History (Number of old passwords remembered)

The policy is the effective policy, which is a combination of the local policy settings (if any) and the domain-wide policy settings made on the Domain Controller(s) for the domain.

This probe requires authentication to be successful.

IMPACT:
This password policy information may be used for auditing a Windows-based network for password policy compliance of its nodes. An attacker with a working account can use it to query the network and obtain information.
SOLUTION:
N/A
RESULT:
Effective Password Policy:

Mininum Password Length - 0 (Not defined/Infinite).
Password History Length - 0 (Not defined/Infinite).
Minimum Password Age - 0 (Not defined/Infinite).
Maximum Password Age - 42 Days.
Password Complexity - Not Set.
QID:45028   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Security and Accounts Manager (SAM) Database of any Windows host participating in a Windows Domain has information about the account lockout policy set on that system. Such information was gathered from the target and is shown in the Results section below.

It should be noted that if the Domain Controller/Active Directory on this domain enforces a policy as well, the Domain Controller policy will override the local policies (if any) of each host. Further, it takes up to a couple of minutes for changes on the Domain Controller policy to be propogated to all the individual hosts on that domain.

RESULT:
Effective Account Lockout Policy:

Maximum Failed Logon Attempts Before Lockout - 0 (Not defined/Infinite/Will Not Lockout).
Lockout Logon-Attempts-Counter Duration - 30 Minutes.
Lockout Duration - 30 Minutes.
QID:45017   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Several different techniques can be used to identify the operating system (OS) running on a host. A short description of these techniques is provided below. The specific technique used to identify the OS on this host is included in the RESULTS section of your report.

1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.

Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.

2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).

3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.

4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Operating SystemTechniqueID
Windows 2000TCP/IP FingerprintU1263:25
Windows 2000 ServerSRVSVCInterface 
Windows 5.0/Windows 2000 LAN ManagerCIFS via TCP Port 139 
QID:70022   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The following DCE-RPC / MS-RPC services are active on the remote host.
IMPACT:
N/A
SOLUTION:
Shut down any unknown or unused service on the list. In Windows, this is done in the "Services" Control Panel. In other environments, this usually requires editing a configuration file or start-up script. If you have provided Windows Authentication credentials, the Microsoft Registry service supporting the named pipe "\PIPE\winreg" must be present to allow CIFS to access the Registry.
RESULT:
DescriptionVersionTCP PortsUDP PortsHTTP PortsNetBIOS/CIFS Pipes
DCE Remote Management1.01025   
IMS Admin Base0.01034   
Device Manager1.0   \pipe\browser
License Logging Service0.0   \pipe\llsrpc
Microsoft Distributed Transaction Coordinator1.01025   
Microsoft Local Security Architecture0.0   \PIPE\lsarpc
Microsoft Scheduler Control Service1.01026   
Microsoft Security Account Manager1.0   \PIPE\samr
Microsoft Server Service3.0   \PIPE\browser, \PIPE\srvsvc
Microsoft Spool Subsystem1.0   \PIPE\spoolss
Microsoft Task Scheduler1.01026   
Microsoft Workstation Service1.0   \PIPE\wkssvc
RPC Browser0.0   \PIPE\browser
Simple Mail Transfer Protocol1.01034   
Simple Mail Transfer Protocol2.01034   
Simple Mail Transfer Protocol3.01034   
(Unknown Service)0.01025, 1034   
(Unknown Service)0.01034   
DCOM Class Factory0.01034   
QID:90266   Category:Windows   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Microsoft best practices documents recommend renaming the built-in Guest account. This test enumerates the actual name of the built-in Guest account.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Guest
QID:90087   Category:Windows   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The scanner probed the target host's Windows Registry or the SQL TCP port, and has gathered the version information for the Microsoft SQL Server installed on the target host.

The version information is shown in the Results section. "CurrentVersion" gives the version of the original Microsoft SQL Server installation on the target host. "CSDVersion", if present, gives the updated version due to any later patches/service packs installed on the host. The version obtained from the TCP port (typically 1433) is listed separately as well (if found).

Though the registry value and the one got from TDS protocol are reliable to a good degree in identifying the patch levels like service packs and cumulative patches, they may not reflect version changes due to all hotfixes.

Further, the SQL version found can be correlated with the SQL patch information from the SQLSecurity.com's version-mapping table.

RESULT:
Version found by probing SQL TCP port 1433: 8.0.196
QID:74042   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
220 demo02 Microsoft ESMTP MAIL Service, Version: 5.0.2195.2966 ready at Wed, 7 Sep 2005 00:17:36
-0700
QID:74145   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Mail Service on this host can be identified from a remote system using SMTP fingerprinting. According to the results of this fingerprinting technique, the Mail Service name and version are listed below.
RESULT:
Name: Microsoft ESMTP MAIL Service, Version: 6.0.3790.211 or earlier
QID:12059   Category:CGI   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server was probed for various URL-encoding schemes that it supports.

Per this paper by Daniel Roelker that was presented at Defcon 11, popular Web servers like Microsoft IIS support a variety of encoding schemes for the URLs. These include Percent-escaped Hex Encoding, Double-percent Escaped Hex Encoding, Microsoft's %U Encoding, Percent-escaped 2-Byte UTF-8 Encoding, and Raw 2-Byte UTF-8 Encoding.

For a sample HTTP GET request, GET /. HTTP/1.0, the following illustrates the encoded URI under these schemes:

Percent-escaped Hex Encoding: GET /%2e HTTP/1.0
Double-percent Escaped Hex Encoding: GET /%252e HTTP/1.0
Percent-escaped 2-Byte UTF-8 Encoding: GET /%C0%AE HTTP/1.0
Raw 2-Byte UTF-8 Encoding: GET /\xC0\xAE HTTP/1.0 (Actual raw 0xC0 and 0xAE bytes)
Microsoft's %U Encoding: GET /%u002e HTTP/1.0

The supported encoding schemes are listed in the Results section.

URI encoding is relevant to Web server security since, as mentioned in the paper above, attackers could launch HTTP attacks while at the same time obfuscating the URIs to evade detection by Intrusion Detection Systems that are not capable of decoding the URIs.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Single-%-Escaped Hex-Encoding Supported
%-Escaped 2-Byte UTF-8 Encoding Supported
%-Escaped 3-Byte UTF-8 Encoding Supported
Raw 2-Byte UTF-8 Encoding Supported
Raw 3-Byte UTF-8 Encoding Supported
Microsoft's %U Encoding Supported
QID:6   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The host name of this computer was obtained from a DNS server.
RESULT:
IP addressHost name
XXX.XXX.XXX.XXXdemo02.treutler.de
QID:82040   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.

We have sent the following types of packets to trigger the host to send us ICMP replies:

Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)

Listed in the "Result" section are the ICMP replies that we have received.

RESULT:
ICMP Reply TypeTriggered ByAdditional Information
Echo (type=0 code=0)Echo RequestEcho Reply
Timestamp (type=14 code=0)Timestamp Request06:20:43 GMT
Unreachable (type=3 code=2)IP with High ProtocolProtocol Unreachable
Unreachable (type=3 code=3)UDPPort Unreachable
QID:45006   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in between.
RESULT:
HopsIPRound Trip TimeProbe
1195.154.210.1581.53msICMP
2212.129.22.53.31msICMP
3212.129.8.170.71msICMP
4212.129.8.130.56msICMP
5213.200.76.1930.62msICMP
6213.200.81.25377.57msICMP
7208.173.135.17783.21msICMP
8204.70.192.20684.00msICMP
9204.70.192.149158.36msICMP
10208.172.147.110157.81msICMP
11216.34.3.66595.88msUDP
12XXX.XXX.XXX.XXX158.10msICMP
QID:45004   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This information was gathered using WHOIS service for the target network. Note that this is not all the information that WHOIS service provides.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may help in launching attacks against it.
RESULT:
The network handle is: NET-64-41-128-0-1
Network description:
Savvis
SAVVI-2
QID:45005   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This information was gathered using the WHOIS service for the network and is believed to be the ISP of the target network.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may aid in launching further attacks against it.
RESULT:
The ISP network handle is: NET-204-70-0-0-1
ISP Network description:
Savvis
SAVVI-3
QID:45032   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
LSA (Local Security Authority Database) is a protected subsystem that authenticates and logs users onto the local system.

Windows systems by default have the administrator account's name configured as "Administrator". This can very easily be changed to a non-default value (like root, for example) to harden security against password bruteforcing.

LSA, internally, refers to user accounts by what are called RIDs (Relative IDs) instead of the friendlier names (like "Administrator") used only for GUI and display purposes. The administrator account on any Windows system always has a RID of 500, even if the name has been changed.

The scanner probed the LSA for the name that maps to the RID of 500, which is the administrator account name, changed or unchanged. The name is listed in the Result section below.

RESULT:
Administrator
QID:45027   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Security Accounts Manager holds user and machine account information. The scanner found at least one disabled user or machine account in the SAM database for the target Windows machine. The accounts found are listed in the Results section.
RESULT:
Disabled User/Machine Accounts:
Guest
QID:45039   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The following host names were discovered for this computer using various methods such as DNS look up, NetBIOS query, and SQL server name query.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Host NameSource
demo02.treutler.deFQDN
DEMO02NetBIOS
DEMO02MSSQL Monitor
DEMO02NTLM NetBIOS
demo02NTLM DNS
QID:45038   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan Time for this host is reported in the Result section below.

The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Scan duration: 1323 seconds
QID:82044   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The NetBIOS host name of this computer has been detected.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
DEMO02
QID:82062   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The NetBIOS workgroup or domain name for this system has been detected.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
WORKGROUP
QID:82023   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site.
RESULT:
PortIANA Assigned Ports/ServicesDescriptionService DetectedOS On Redirected Port
25smtpSimple Mail Transfersmtp  
80wwwWorld Wide Web HTTPhttp  
139netbios-ssnNETBIOS Session Servicenetbios ssn  
445microsoft-dsMicrosoft-DSmicrosoft-ds  
1025blackjacknetwork blackjackmsrpc  
1026ntermremote_login network_terminalmsrpc  
1034unknownunknownmsrpc  
1433ms-sql-sMicrosoft-SQL-Servermssql  
1755netshowms-streamingMicrosoft Multimedia Stream  
3372tip2TIP 2 / MSDTCmsdtc  
3389ms-wbt-serverMS WBT Serverwin remote desktop  
6666ircuIRCUunknown  
8521unknownunknownhttp  
QID:82004   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.

Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site.
RESULT:
PortIANA Assigned Ports/ServicesDescriptionService Detected
135msrpc-epmapepmap DCE endpoint resolutionunknown
137netbios-nsNETBIOS Name Servicenetbios ns
138netbios-dgmNETBIOS Datagram Serviceunknown
445microsoft-dsMicrosoft-DSunknown
500isakmpisakmpunknown
1027unknownunknownunknown
1033unknownunknownunknown
1035unknownunknownunknown
1434ms-sql-mMicrosoft-SQL-Monitormssql monitor
QID:82053   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The host responds to a TCP SYN packet with at least one of the following flags set with a SYN ACK packet: RST, FIN, ACK, FIN|PSH.
IMPACT:
This behavior in the TCP/IP implementation may allow a remote user to potentially bypass a firewall protecting the host, as some (especially stateless) firewalls may be configured to allow all TCP packets with one of these flags set (RST, FIN, ACK, FIN|PSH) to go through without examining the packets' SYN flag.
SOLUTION:
Many operating systems are known to have this behavior.
RESULT:
Host responded to the following TCP probes to port 25 with SYN+ACK:
SYN+FIN
SYN+FIN+PSH
QID:82046   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many operating systems, these changes reflect the network load of the host at the time this test was conducted.
RESULT:
IP ID changes observed (network order) for port 25: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1
Duration: 308 milli seconds
QID:82045   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of difficulty for exploitation of the TCP ISN generation scheme used by the host.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Average change between subsequent TCP initial sequence numbers is 53500 with a standard deviation of
10804. These TCP initial sequence numbers were triggered by TCP SYN probes sent to the host at an
average rate of 1/(9993 microseconds). The degree of difficulty to exploit the TCP initial sequence
number generation scheme is: hard.
QID:70028   Category:SMB / NETBIOS   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Windows authentication was performed. The Result section in your detailed results includes a list of authentication credentials used.

The service also attempts to authenticate using common credentials. You should verify that the credentials used for successful authentication were those that were provided in the Windows authentication record. User-provided credentials failed if the discovery method shows "Unable to log in using credentials provided by user, fallback to NULL session". If this is the case, verify that the credentials specified in the Windows authentication record are valid for this host.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
User Name(none)
Domain(none)
Authentication SchemeNULL session
SecurityUser-based
SMB SigningDisabled
Discovery MethodNULL session, no valid login credentials provided or found
QID:19101   Category:Database   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The scanner probed the target Microsoft SQL Server to determine if a cluster is being used. Using SQL clustering is required for redundancy/fail-over purposes. The results of the check are posted below.
RESULT:
SQL Cluster Not Installed
QID:43007   Category:Hardware   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
It is possible to obtain the MAC address information of the network adapters on the target system. Various sources such as SNMP and NetBIOS provide such information. This vulnerability test attempts to gather and report on this information in a table format.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
MethodMAC AddressVendor
NBTSTAT00:E0:81:21:05:74TYAN COMPUTER CORP.
QID:86672   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Based largely on the HTTP reply code, the following directories are most likely present on the host.
RESULT:
Directories
/iisadmin/
/scripts/
/msadc/
/iishelp/
/Printers/
/MSADC/
QID:86432   Category:Web server   CVE ID:CAN-2002-1142
Vendor Reference:MS02-065
THREAT:
Microsoft Data Access Components (MDAC) is a collection of components that provide database connectivity for Microsoft Windows Web servers and browsers. The Remote Data Services (RDS) component of MDAC provides underlying functionality that supports three-tiered architectures.

In versions of MDAC prior to Version 2.7, the RDS component contains an unchecked buffer that can result in data overwriting the heap. See Microsoft Security Bulletin MS02-065 for more details.

IMPACT:
If the host is running an MDAC version prior to Version 2.7 and the patch described in Microsoft Security Bulletin MS02-065 has not been applied, a heap overflow vulnerability may be exploited to execute arbitrary code.
SOLUTION:
Make sure the host is running MDAC Version 2.7 or later. If this is not the case, make sure you have applied the patch described in Microsoft Security Bulletin MS02-065.
RESULT:
No results available
QID:86000   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
Server VersionServer Banner
Microsoft-IIS/5.0Microsoft-IIS/5.0
QID:45033   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server supports the TRACE and/or TRACK HTTP methods. These methods allow debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS Web server uses an alias TRACK for the TRACE method, and is functionally the same.

The exact method(s) used are shown in the Results section.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
TRACE method enabled on / directory
TRACK method enabled on / directory
QID:86000   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
Server VersionServer Banner
Microsoft-IIS/5.0Microsoft-IIS/5.0
Vulnerabilities Total 80
Security Risk  5.0
QID:68524   Category:RPC   CVE ID:CAN-2003-0722
Vendor Reference:56740
THREAT:
Solaris is the Unix operating system variant maintained and distributed by Sun Microsystems.

A problem has been discovered in the Sun Solaris "sadmin" service. Because of this issue, it may be possible for a remote user to gain unauthorized administrative access to the target.

The problem is in the handling of authentication credentials. In the default configuration, the "sadmin" service uses the AUTH_SYS or AUTH_UNIX RPC authentication mechanism, which is vulnerable to spoofing attacks. Since the authentication credentials (uid, gid, and hostname of client) are completely in an attacker's control, an attacker can circumvent any access restrictions the service may have in place.

Note: The "sadmin" service is enabled by default.

IMPACT:
This vulnerability can be exploited to run arbitrary privileged commands on the vulnerable host, and can lead to a complete system compromise.
SOLUTION:
A solution is to either disable the "sadmin" service if it is not required, or restart the service with stronger authentication.

The service may be disabled by commenting the service out of the inetd.conf configuration file, and restarting inetd.

The service may be reconfigured to use stronger AUTH_DES authentication instead. To do this, append "-S 2" to the inetd.conf configuration and restart inetd. Please check Sun's Sadmind Alert, which provides details about this configuration process.

RESULT:
/bin/sh could be executed on the target host.
QID:38304   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
SSH1 protocol was deprecated due to multiple vulnerabilities and design flaws. Among multiple vulnerabilities that exist in SSH protocol Version 1 are:
-a CRC32 compensation attack detector vulnerability (buffer overflow)
-an unauthorized session key recovery problem

Multiple vendors' implementations are vulnerable due to the fact that these are protocol design errors. Version 2 of the SSH protocol fixed these errors.

IMPACT:
The consequences of vulnerabilities present is SSH Version 1 include:
-SSH protected traffic compromise
-root shell access to the system running SSH server
SOLUTION:
Disable SSH1 support. See your vendor's Web site for information on how to disable SSH protocol Version 1 support. Some references are provided below:
SSH Communications Security
F-Secure
OpenSSH

Note: Do not enable SSH Version 1 Fallback since systems with upgraded versions of SSH and with Fallback Version 1 enabled are still vulnerable.

RESULT:
SSH1 supportedyes
Supported ciphers for SSH13des, blowfish
Supported authentications for SSH1RSA, keyboard_interactive, password
QID:31003   Category:Finger   CVE ID:CVE-1999-0259
Vendor Reference:N/A  
THREAT:
The finger service is present on your system. This service shows which users are logged on. It also provides some user details.
IMPACT:
Unauthorized users often exploit this service to obtain the user's login name. This service potentially makes the system vulnerable, especially if some users have weak passwords.
SOLUTION:
Remove this service from your system. On Unix sytems, it is usually located in the /etc/inetd.conf file. On other systems, check the service's configuration file.
RESULT:
No one logged on
QID:31000   Category:Finger   CVE ID:CAN-1999-0197
Vendor Reference:N/A  
THREAT:
The finger service is present on your system. This service discloses which users are logged on, and provides information about those users. On some Operating Systems, the "0" acts as a wildcard and provides logins for almost all accounts existing on the server.
IMPACT:
Aggressive intruders often exploit this service to get user login names on a system. This makes the system vulnerable to other attacks, especially if users have weak passwords.
SOLUTION:
Remove this service from your system. On Unix systems, it is usually located in the /etc/inetd.conf configuration file. On other systems, check the inetd configuration file
RESULT:
Login Name TTY Idle When Where
daemon ??? < . . . . >
bin ??? < . . . . >
sys ??? < . . . . >
wkandek ??? pts/2 <Sep 12, 2002> us01-oppc03.cor
ldonayre ??? pts/1 <Nov 6, 2002> fw01-redshores.
scanner ??? pts/17 <Sep 6 11:37> scanner17.sjdc0
QID:31002   Category:Finger   CVE ID:CAN-1999-0106
Vendor Reference:N/A  
THREAT:
The finger service is present on your system. This service discloses which users are logged on, and provides information about those users. On older versions, the finger daemon accepts forwarding. This could allow unauthorized users to proxy "finger" requests to other servers via your server.

Additionally, a denial of service can be implemented on networks using NIS (Network Information Service). This is done by executing a finger command containing hundreds of nested '@' characters. This generates a lot of traffic in the network and consumes a lot of the NIS master server's CPU.

IMPACT:
If successfully exploited, unauthorized users can use your finger service to anonymously scan other hosts that have finger enabled, or cause a denial of service on networks using NIS.
SOLUTION:
Remove this service from your system. On Unix systems, it's typically located in the /etc/inetd.conf file. On other systems, check the service's configuration file.
RESULT:
No results available
QID:86175   Category:Web server   CVE ID:N/A  
Vendor Reference:SPR:JCHN4V2HUY,MS02-018,SUN:49475
THREAT:
Your Web server does not filter script embedding from links displayed on a server's Web site.

A malicious user can exploit this vulnerability to cause JavaScript commands or embedded scripts to be executed by any user who clicks on the hyperlink. Upon clicking the hyperlink, your Web server will generate an error message including the specified or embedded script. The specified or embedded script is executed in the client's browser and treated as content originating from the target server returning the error message (even though the scripting may have originated from another site entirely).

IMPACT:
By exploiting this vulnerability, malicious scripts can be executed in the client's browser.
SOLUTION:
Any Web server may be affected by this vulnerability. See below for a list of patches for some specific Web servers. If this information doesn't apply to your Web server, contact your Web server vendor.

This issue is fixed in Sun ONE / iPlanet Web Server 4.1 Service Pack 12 and above. The latest service pack is available for download from Sun ONE Web Server Enterprise Edition 4.1 Service Pack 13.

For Microsoft IIS Web server, apply the cumulative patch described in Microsoft Security Bulletin MS02-018. No additional service packs are planned for Windows NT 4.0. IIS 5.0 fixes will be included in Windows 2000 Service Pack 3. IIS 5.1 fixes will be included in Windows XP Service Pack 1.

Lotus Domino had this issue with Domino R5 Web server. Check the Lotus advisory SPR# JCHN4V2HUY. We also advise you to upgrade to the latest version.

RESULT:
GET /"><script>alert(document.domain)</script> HTTP/1.0
Host: demo03.treutler.de:898

HTTP/1.0 404 Not Found
Date: Wed, 07 Sep 2005 07:26:27 GMT
Server: Tomcat/2.1
Content-Type: text/html
Servlet-Engine: Tomcat/2.1 (Java 1.2.2; SunOS 5.8 sparc; java.vendor=Sun Microsystems Inc.)

<h1>Error: 404</h1>
File Not Found<br>/"><script>alert(document.domain)</script>
QID:86595   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Sun Management Center is a Web-based system management interface for Sun Solaris. It is maintained and distributed by Sun.

A problem in the handling of error messages was identified in Sun Management Center. This issue enables malicious users to gain sensitive information about vulnerable hosts. The problem is in the returning of error messages by Sun Management Center. The Sun Management Center server typically runs on TCP port 898.

The Sun Management Center returns an error message when a user sends a request for a specific file in the file system using directory traversal strings. The problem is that a different error message is returned when the file exists versus when the file does not exist.

When the requested file does not exist, the service gives a response similar to the following.

Error: 404
File Not Found /stuff/blah

When the requested file does exist, the service gives the following response.

Error: 404
No detailed message

Because of these different error messages, a malicious user could determine key system configuration variables. Information gained as a result could be used in further attacks against system and network resources.

IMPACT:
By exploiting this vulnerability, malicious users could determine key system configuration variables. Information gained as a result could be used in further attacks against system and network resources.
SOLUTION:
We are not currently aware of any vendor-supplied patches for this issue. Check Sun's Web site for the latest information.
RESULT:
HTTP/1.0 404 Not Found
Date: Wed, 07 Sep 2005 07:26:42 GMT
Server: Tomcat/2.1
Content-Type: text/html
Servlet-Engine: Tomcat/2.1 (Java 1.2.2; SunOS 5.8 sparc; java.vendor=Sun Microsystems Inc.)

<h1>Error: 404</h1>
No detailed message
QID:45002   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This is the global system user list, which was retrieved during the scan by exploiting one or more vulnerabilities. The Treutler IDs for the vulnerabilities leading to the disclosure of these users are also given in the Result section. Each user will be displayed only once, even though it may be obtained by using different methods.
IMPACT:
These common account(s) can be used by a malicious user to break-in the system via password bruteforcing.
SOLUTION:
To prevent your host from being attacked, do one or more of the following:
  • Remove (or rename) unnecessary accounts
  • Shutdown unnecessary network services
  • Ensure the passwords to these accounts are kept secret
  • Use a firewall to restrict access to your hosts from unauthorized domains
RESULT:
User NameSource Vulnerability (TreutlerID)
root74045
daemon31003
bin31003
sys31003
wkandek31003
ldonayre31003
scanner31003
adm31003
lp31003
uucp31003
nuucp31003
listen31003
nobody31003
nobody431003
noaccess31003
QID:82054   Category:TCP/IP   CVE ID:CAN-2004-0230
Vendor Reference:N/A  
THREAT:
TCP provides stateful communications between hosts on a network. TCP sessions are established by a three-way handshake and use random 32-bit sequence and acknowledgement numbers to ensure the validity of traffic. A vulnerability was reported that may permit TCP sequence numbers to be more easily approximated by remote attackers. This issue affects products released by multiple vendors.

The cause of the vulnerability is that affected implementations will accept TCP sequence numbers within a certain range, known as the acknowledgement range, of the expected sequence number for a packet in the session. This is determined by the TCP window size, which is negotiated during the three-way handshake for the session. Larger TCP window sizes may be set to allow for more throughput, but the larger the TCP window size, the more probable it is to guess a TCP sequence number that falls within an acceptable range. It was initially thought that guessing an acceptable sequence number was relatively difficult for most implementations given random distribution, making this type of attack impractical. However, some implementations may make it easier to successfully approximate an acceptable TCP sequence number, making these attacks possible with a number of protocols and implementations.

This is further compounded by the fact that some implementations may support the use of the TCP Window Scale Option, as described in RFC 1323, to extend the TCP window size to a maximum value of 1 billion.

This vulnerability will permit a remote attacker to inject a SYN or RST packet into the session, causing it to be reset and effectively allowing for denial of service attacks. An attacker would exploit this issue by sending a packet to a receiving implementation with an approximated sequence number and a forged source IP address and TCP port.

There are a few factors that may present viable target implementations, such as those which depend on long-lived TCP connections, those that have known or easily guessed IP address endpoints and those implementations with easily guessed TCP source ports. It has been noted that Border Gateway Protocol (BGP) is reported to be particularly vulnerable to this type of attack, due to the use of long-lived TCP sessions and the possibility that some implementations may use the TCP Window Scale Option. As a result, this issue is likely to affect a number of routing platforms.

Another factor to consider is the relative difficulty of injecting packets into TCP sessions, as a number of receiving implementations will reassemble packets in order, dropping any duplicates. This may make some implementations more resistant to attacks than others.

It should be noted that while a number of vendors have confirmed this issue in various products, investigations are ongoing and it is likely that many other vendors and products will turn out to be vulnerable as the issue is investigated further.

IMPACT:
Successful exploitation of this issue could lead to denial of service attacks on the TCP based services of target hosts. Other consequences may also result, such as man-in-the-middle attacks.
SOLUTION:
Please first check the results section below for the port number on which this vulnerability was detected. If that port number is known to be used for port-forwarding, then it is the backend host that is really vulnerable.

Various implementations and products including Check Point, Cisco, Cray Inc, Hitachi, Internet Initiative Japan, Inc (IIJ), Juniper Networks, NEC, Polycom, and Yamaha are currently undergoing review. Contact the vendors to obtain more information about affected products and fixes. NISCC Advisory 236929 - Vulnerability Issues in TCP details the vendor patch status as of the time of the advisory, and identifies resolutions and workarounds.

The Internet Engineering Task Force (IETF) has developed an Internet-Draft titled Transmission Control Protocol Security Considerations that addresses this issue.

Workaround:

The following BGP-specific workaround information has been provided.

For BGP implementations that support it, the TCP MD5 Signature Option should be enabled. Passwords that the MD5 checksum is applied to should be set to strong values and changed on a regular basis.

Secure BGP configuration instructions have been provided for Cisco and Juniper at these locations:
http://www.cymru.com/Documents/secure-bgp-template.html
http://www.qorbit.net/documents/junos-bgp-template.pdf

RESULT:
Tested on port 21 with an injected SYN/RST offset by 16 bytes.
Tested on port 22 with an injected SYN/RST offset by 16 bytes.
QID:11   Category:RPC   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Portmapper/Rpcbind listens on port 111 and stores an updated list of registered RPC services running on the server (RPC name, version and port number). It acts as a "gateway" for clients wanting to connect to any RPC daemon.

When the portmapper/rpcbind is removed or firewalled, standard RPC client programs fail to obtain the portmapper list. However, by sending carefully crafted packets, it's possible to determine which RPC programs are listening on which port. This technique is known as direct RPC scanning. It's used to bypass portmapper/rpcbind in order to find RPC programs running on a port (TCP or UDP ports). On Linux servers, RPC services are typically listening on privileged ports (below 1024), whereas on Solaris, RPC services are on temporary ports (starting with port 32700).

IMPACT:
Unauthorized users can build a list of RPC services running on the host. If they discover vulnerable RPC services on the host, they then can exploit them.
SOLUTION:
Firewalling the portmapper port or removing the portmapper service is not sufficient to prevent unauthorized users from accessing the RPC daemons. You should remove all RPC services that are not strictly required on this host.
RESULT:
NameProgramVersionProtocolPort
nlockmgr1000211-4tcp4045
portmap/rpcbind1000002-4tcp111
rpc.cmsd1000682-5tcp32785
rpc.cmsd1000682-5udp32789
rquotad1000111udp32783
rstatd1000012-4udp32788
rusersd1000022-3tcp32772
rusersd1000022-3udp32784
sadmind10023210udp32782
sprayd1000121udp32786
status1000241tcp32771
status1000241udp32785
ttdbserver1000831tcp32773
walld1000081udp32787
QID:66032   Category:RPC   CVE ID:CAN-1999-0624
Vendor Reference:N/A  
THREAT:
The RPC rstatd daemon enables the Administrator to monitor the host's load average from a remote system using the "rup" command line. It discloses other sensitive information, including the time at which the machine was booted, the current time of the host, the number of packets sent and received from the ethernet interface.
IMPACT:
Unauthorized users can check the system load to establish when attacks against the host are most likely to be successful. Since a low host load average indicates that the system is idle, the attack is less likely to be noticed by the System Administrator when the host load average is low.

On SunOS, the length of time that the host takes to boot may also be of interest to unauthorized users since this value is sometimes used to generate ID or tokens internally.

SOLUTION:
Unless it is required on this system, remove the rstatd daemon from the list of default RPC programs run on boot.
RESULT:
load average: 0.33, 0.09, 0.06

host was booted on Fri Oct 1 10:46:42 2004

current time of host is Wed Sep 7 00:21:06 2005

QID:74045   Category:Mail services   CVE ID:CAN-1999-0531
Vendor Reference:N/A  
THREAT:
Simple Mail Transfer Protocol (SMTP) is used to transfer mail between servers. When one mail server establishes a connection with another mail server to deliver an e-mail message, it can check the validity of the destination user on the remote host by using the EXPN command.
IMPACT:
If a host is running an SMTP server, unauthorized users can obtain valid logins by brute forcing common "login names" with the EXPN command.
SOLUTION:
Your mail server should not allow remote users to verify the existence of a particular user on your system. If you are using Sendmail Version 8, then you can disable the EXPN command by adding the line "noexpn" to your sendmail.cf file, which is usually located in the /etc directory.
RESULT:
user "root" expanded to: 2.1.5 Super-User <root@demo03.treutler.de>

QID:74046   Category:Mail services   CVE ID:CAN-1999-0531
Vendor Reference:N/A  
THREAT:
Simple Mail Transfer Protocol (SMTP) is used to transfer mail between servers. When one mail server establishes a connection with another mail server to deliver an e-mail message, it can check the validity of the destination user on the remote host by using the VRFY command.
IMPACT:
If a host is running an SMTP server, unauthorized users can obtain valid logins by brute forcing common "login names" with the VRFY command.
SOLUTION:
Your mail server should not allow remote users to verify the existence of a particular user on your system. If you are using Sendmail Version 8, then you can disable the VRFY command by adding the line "novrfy" to your sendmail.cf file, which is usually located in the /etc directory.
RESULT:
root
QID:38002   Category:General remote services   CVE ID:CVE-1999-0103
Vendor Reference:N/A  
THREAT:
This system is running UDP services, which are generally used for networking testing purposes only (7 echo, 9 discard, 13 daytime, 17 quote of the day, 19 chargen, 37 time). We recommend that no information be disclosed (even the current server time).

Moreover, on older Operating Systems, Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server. This can be accomplished with attacks like UDP bombs or UDP packet storms.

IMPACT:
By exploiting this vulnerability, unauthorized users can gather information about the server or cause a Denial of Service, depending on the TCP/IP stack being run.
SOLUTION:
Disable all UDP services that are not required on the server.
RESULT:
Port list:
7
9
13
19
37
QID:38003   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This system is running TCP services, which are generally used for network testing purposes only (7 echo, 9 discard, 13 daytime, 17 quote of the day, 19 chargen, 37 time). We recommend that no information be disclosed (even current server time). Also, we advise against running superflous services.
IMPACT:
By exploiting this vulnerability, unauthorized users can gather information about the server.
SOLUTION:
Disable all TCP services not required on the server.
RESULT:
Echo Service detected on port 7.
Chargen detected on port 19.
Daytime detected on port 13.
Time detected on port 37.
QID:38019   Category:General remote services   CVE ID:CAN-1999-0651
Vendor Reference:N/A  
THREAT:
The rlogin service is open. It's possible that this service is wrapped on your host. Wrapping provides a first level of security. If the service is wrapped, check that all hosts authorized by the TCP wrapper to connect to the rlogin service are secure. The security of your host depends on the security of hosts connecting to it.
IMPACT:
This can lead to severe problems since the rlogin service is vulnerable to both brute force and spoofing attacks.
SOLUTION:
Remove the rlogin service. If a remote connection is required on this host, install Secure Shell or France Secure Shell (fsh) in France. This is an appliance with crypto regulation. You can download Secure Shell from the SSH Web site (www.ssh.com).

If you cannot install one of these programs, then you should ensure that a TCP Wrapper is installed to restrict the hosts that can connect to this service.

RESULT:
Detected service rlogin and os SOLARIS 8
QID:38021   Category:General remote services   CVE ID:CAN-1999-0618
Vendor Reference:N/A  
THREAT:
The "Remote Execution" (rexec) service, which uses TCP port number 512, was detected on this host. This service is based on a login/password authentication procedure and allows remote users to execute commands on the system. rexec uses a protocol similar to the rshd/rlogind apart from the .rhosts and /etc/host.equiv authentication (where no password is required)
IMPACT:
If unauthorized users manage to obtain information about the login names of the users on your system (by using "finger", for example), then they can try to brute force accounts by testing login/password combinations. Compared to many telnet daemons that deny login as root, rexec allows remote users with the correct password to execute commands as root.
SOLUTION:
We strongly advise that you remove the "rexec" service from your system. If an alternative is required, we recommend installing Secure Shell (SSH) which has the same features as the "r* services" daemon, but also adds an encryption layer on top of the protocol to prevent eavesdropping and provide better authentication.
RESULT:
Detected service rsh/rexec and os SOLARIS 8
QID:38020   Category:General remote services   CVE ID:CAN-1999-0651
Vendor Reference:N/A  
THREAT:
The "Remote Shell" (RSH) service, which uses TCP port number 514, was detected on this host. If this service is accessible from remote hosts, then the server's host can be compromised because of a problem in the service's trust in IP addresses.

Malicious users heavily exploit the RSH service to log onto hosts in trust relationships. Remote users do not need a password to log into accounts that the ".rhosts" file has authorized them for. This can be done for all users with a general file called "/etc/hosts.equiv".

Two plus signs (+ +) in an ".rhosts" file translates to "anybody can log into my account without having to supply a password". A line with a single plus sign (+) in the "/etc/hosts.equiv" file translates to "any user on any system that can connect to this machine can log into the same user name on this machine provided it exists on the local host".

IMPACT:
By exploiting this vulnerability, unauthorized users can impersonate a trusted machine to log in without a password. To impersonate a host, the unauthorized user has to set up a TCP Sequencing attack against this host. Such attacks are not common, but are, nevertheless, extremely dangerous. HP-UX, Windows and Linux (versions prior to the 2.0.35 kernel) are extremely vulnerable.
SOLUTION:
Since host-based access controls are not very secure, you should choose a more secure access protocol. Some systems prevent this kind of attack more effectively than others because they are not sensitive to Sequence prediction (the key to TCP Sequencing attacks). Linux systems Version 2.0.36 and later, and Solaris Version 2.x have built-in protection.

Install an upgrade of your rlogind server. Be sure to use a secure replacement for rlogin, such as Secure Shell (www.ssh.com), or France Secure Shell (FSH) in France in appliance with crypto regulations.

RESULT:
Detected service rsh/rexec and os SOLARIS 8
QID:86445   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Web server has some listable directories. Very sensitive information can be obtained from directory listings.
IMPACT:
A remote user may exploit this vulnerability to obtain very sensitive information on the host. The information obtained may assist in further attacks against the host.
SOLUTION:
Disable directory browsing or listing for all directories.
RESULT:
Listable Directories
/images/
QID:86473   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A Web server was detected that supports the HTTP TRACE method. This method allows debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS web server uses an alias TRACK for this method, and is functionally the same.

A vulnerability related to this method was discovered. A malicious, active component in a Web page can send Trace requests to a Web server that supports this Trace method. Usually, browser security disallows access to Web sites outside of the present site's domain. Although unlikely and difficult to achieve, it's possible, in the presence of other browser vulnerabilities, for the active HTML content to make external requests to arbitrary Web servers beyond the hosting Web server. Since the chosen Web server then echoes back the client request unfiltered, the response also includes cookie-based or Web-based (if logged on) authentication credentials that the browser automatically sent to the specified Web application on the specified Web server.

The significance of the Trace capability in this vulnerability is that the active component in the page visited by the victim user has no direct access to this authentication information, but gets it after the target Web server echoes it back as its Trace response.

Since this vulnerability exists as a support for a method required by the HTTP protocol specification, most common Web servers are vulnerable.

The exact method(s) supported, Trace and/or Track, and their responses are in the Results section below.

IMPACT:
If this vulnerability is successfully exploited, users of the Web server may lose their authentication credentials for the server and/or for the Web applications hosted by the server to an attacker. This may be the case even if the Web applications are not vulnerable to cross site scripting attacks due to input validation errors.
SOLUTION:
Solutions for some of the common Web servers are supplied below. For other Web servers, please check your vendor's documentation.

Apache: Recent Apache versions have a Rewrite module that allows HTTP requests to be rewritten or handled in a specific way. Compile the Apache server with the mod_rewrite module. You might need to uncomment the 'AddModule' and 'LoadModule' directives in the httpd.conf configuration file. Add the following lines for each virtualhost in your configuration file (Please note that, by default, Rewrite configurations are not inherited. This means that you need to have Rewrite directives for each virtual host in which you wish to use it):

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
</IfModule>
With this configuration, Apache catches all TRACE requests, and replies with a page reporting the request as forbidden. None of the original request's contents are echoed back.

A slightly tighter fix is to use:

<IfModule mod_rewrite.c>
RewriteEngine on
RewriteCond %{REQUEST_METHOD} !^(GET|POST|HEAD)$
RewriteRule .* - [F]
</IfModule>

Microsoft IIS: Microsoft released URLScan, which can be used to screen all incoming requests based on customized rulesets. URLScan can be used to sanitize or disable the TRACE requests from the clients. Note that IIS aliases 'TRACK' to 'TRACE'. Therefore, if URLScan is used to specfically block the TRACE method, the TRACK method should also be added to the filter.

URLScan uses the 'urlscan.ini' configuration file, usually in \System32\InetSrv\URLScan directory. In that, we have two sections - AllowVerbs and DenyVerbs. The former is used if the UseAllowVerbs variable is set to 1, else (if its set to 0), the DenyVerbs are used. Clearly, either can be used, depending on whether we want a Default-Deny-Explicit-Allow or a Default-Allow-Explicit-Deny policy. To disallow TRACE and TRACK methods through URLScan, first remove 'TRACK', 'TRACE' methods from the 'AllowVerbs' section and add them to the 'DenyVerbs' section. With this, URLScan will disallow all 'TRACE' and 'TRACK' methods, and generate an error page for all requests using that method. To enable the changes, restart the 'World Wide Web Publishing Service' from the 'Services' Control Panel item.

Sun ONE/iPlanet Web Server: Here are the sun recommandations to disable the trace method.

For more details about other web servers : Cert Advisory.

RESULT:
TRACE / HTTP/1.1
Host: demo03.treutler.de:898
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.0 200 OK
Date: Wed, 07 Sep 2005 07:26:34 GMT
Server: Tomcat/2.1
Content-Type: message/http
Content-Length: 90
Servlet-Engine: Tomcat/2.1 (Java 1.2.2; SunOS 5.8 sparc; java.vendor=Sun Microsystems Inc.)

TRACE / HTTP/1.1
Host: demo03.treutler.de:898
Via: <script>alert('TreutlerXSS');</script>
TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>

HTTP/1.0 200 OK
Date: Wed, 07 Sep 2005 07:26:34 GMT
Server: Tomcat/2.1
Content-Type: message/http
Content-Length: 61
Servlet-Engine: Tomcat/2.1 (Java 1.2.2; SunOS 5.8 sparc; java.vendor=Sun Microsystems Inc.)

TRACE / HTTP/1.0
Via: <script>alert('TreutlerXSS');</script>
QID:74045   Category:Mail services   CVE ID:CAN-1999-0531
Vendor Reference:N/A  
THREAT:
Simple Mail Transfer Protocol (SMTP) is used to transfer mail between servers. When one mail server establishes a connection with another mail server to deliver an e-mail message, it can check the validity of the destination user on the remote host by using the EXPN command.
IMPACT:
If a host is running an SMTP server, unauthorized users can obtain valid logins by brute forcing common "login names" with the EXPN command.
SOLUTION:
Your mail server should not allow remote users to verify the existence of a particular user on your system. If you are using Sendmail Version 8, then you can disable the EXPN command by adding the line "noexpn" to your sendmail.cf file, which is usually located in the /etc directory.
RESULT:
user "root" expanded to: 2.1.5 Super-User <root@demo03.treutler.de>

QID:74046   Category:Mail services   CVE ID:CAN-1999-0531
Vendor Reference:N/A  
THREAT:
Simple Mail Transfer Protocol (SMTP) is used to transfer mail between servers. When one mail server establishes a connection with another mail server to deliver an e-mail message, it can check the validity of the destination user on the remote host by using the VRFY command.
IMPACT:
If a host is running an SMTP server, unauthorized users can obtain valid logins by brute forcing common "login names" with the VRFY command.
SOLUTION:
Your mail server should not allow remote users to verify the existence of a particular user on your system. If you are using Sendmail Version 8, then you can disable the VRFY command by adding the line "novrfy" to your sendmail.cf file, which is usually located in the /etc directory.
RESULT:
root
QID:82003   Category:TCP/IP   CVE ID:CAN-1999-0524
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. It's principal purpose is to provide a protocol layer able to inform gateways of the inter-connectivity and accessibility of other gateways or hosts. "ping" is a well-known program for determining if a host is up or down. It uses ICMP echo packets. ICMP timestamp packets are used to synchronize clocks between hosts.
IMPACT:
Unauthorized users can obtain information about your network by sending ICMP timestamp packets. For example, the internal systems clock should not be disclosed since some internal daemons use this value to calculate ID or sequence numbers (i.e., on SunOS servers).
SOLUTION:
You can filter ICMP messages of type "Timestamp" and "Timestamp Reply" at the firewall level. Some system administrators choose to filter most types of ICMP messages for various reasons. For example, they may want to protect their internal hosts from ICMP-based Denial Of Service attacks, such as the Ping of Death or Smurf attacks.

However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) are necessary for proper behavior of Operating System TCP/IP stacks.

It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.

RESULT:
time stamp of host: 07:19:05 GMT
QID:82001   Category:TCP/IP   CVE ID:CAN-1999-0524
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer that informs gateways of the inter-connectivity and accessibility of other gateways or hosts. The well-known program "ping" determines if a host is up or down using ICMP echo packets. ICMP mask packets are used to determine the subnet mask of their network.
IMPACT:
Unauthorized users can obtain information about your network by sending ICMP mask packets. Once they have the mask address, they can obtain other valuable information about the network topology. For example, they could obtain the broadcast address.
SOLUTION:

Filter ICMP messages of type "Information Request" and "Information Request Reply" at the firewall level.

Some System Administrators choose to filter most types of ICMP messages for various reasons. For example, they may want to protect their internal hosts from ICMP-based Denial Of Service attacks, such as the "Ping of Death" or "Smurf" attacks.

However, you should never filter all ICMP messages, because some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc.) are necessary for proper behavior of Operating System TCP/IP stacks. It may be wiser to contact your network consultants for advice since this issue impacts your overall network reliability and security.

RESULT:
address mask of host: 255.0.0.0
QID:66047   Category:RPC   CVE ID:CAN-1999-0625
Vendor Reference:N/A  
THREAT:
The rpc.rquotad service is running on your server. No known vulnerabilities exist for this service; however, it is highly sensitive. Therefore, unless it is required, you should disable this service.
IMPACT:
If an unauthorized user finds a vulnerability in this daemon, then it would leave an open door into the server.
SOLUTION:
If the "rquotad" RPC service is not required, then you should disable it.
RESULT:
UDP Port 32783
QID:66046   Category:RPC   CVE ID:CAN-1999-0613
Vendor Reference:N/A  
THREAT:
The rpc.sprayd service is running on the server. No known vulnerabilities exist for this service; however, it is highly sensitive. Therefore, unless it is required, you should disable this service.
IMPACT:
If an unauthorized user finds a vulnerability in this daemon, then it would leave an open door into the server.
SOLUTION:
If the "sprayd" RPC service is not required, then you should disable it.
RESULT:
UDP Port 32786
QID:66052   Category:RPC   CVE ID:CVE-2002-0573
Vendor Reference:44502
THREAT:
Solaris is the freely available, UNIX derivative operating system developed and distributed by Sun Microsystems.

A problem with Solaris could allow a remote user to gain local access and elevated privileges. The problem is with the rwall daemon. The rwall daemon is a remote "wall" facility, designed to send system broadcast messages. It works by passing requests from system to system via RPC, and handling the starting of the rwall daemon with inetd.

It should be noted that this vulnerability requires the functioning of inetd, as well as that of rwalld. Systems that have disabled rwalld from the inetd configuration, or have disabled inetd altogether, are not vulnerable to this issue.

IMPACT:
By exploiting this vulnerability, it's possible to execute arbitrary code on vulnerable systems. When malicious format strings are sent from one system to another, an insecure syslog call may make it possible for a remote attacker to exploit the call to execute arbitrary code. Additionally, the code may be executed as root.
SOLUTION:
There are patches that fix this vulnerability on multiple platforms. To download a patch, go to SunSolve Patch Support Portal, enter the patch number for your platform in the PatchFinder, and follow the online instructions to download the patch.


Sun Platform      -  Patch Number
Sun SunOS 2.5.1 - 11289-01
Sun SunOS 2.6 - 112893-01
Sun SunOS 2.6_x86 - 112894-01
Sun SunOS 7.0 - 112899-01
Sun SunOS 7.0_x86 - 112900-01
Sun SunOS 8.0 - 112846-01
Sun SunOS 8.0_x86 - 112847-01
RESULT:
UDP Port 32787
QID:66004   Category:RPC   CVE ID:CVE-1999-0003
Vendor Reference:NAI:NAI-29,CERT:CA-98.11.tooltalk,SGI:19981101-01-A,SGI:199[...]
THREAT:
The "ttdbserver" RPC service seems vulnerable to a buffer overflow attack.

The following platforms are often vulnerable: Silicon Graphics running IRIX Versions 5.3, 5.4, 6.2, 6.3 and 6.4; Hewlett Packard running HP-UX Versions 10.10, 10.20, 10.30 and 11.00; Sun Microsystems running Solaris Versions 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5, 2.5_x86, 5.4, 5.4_x86, 2.3 and Sun OS Versions 4.1 and 4.1.3_U1; IBM running AIX Versions 4.1.X, 4.2.X and 4.3.X.

This vulnerability is often due to a default installation of the Operating System.

IMPACT:
If successfully exploited, unauthorized remote users can gain Administrator privileges on this host. Such attacks require specific attack programs, which are freely available on the Internet.
SOLUTION:
For the most recent information on possible solutions, read CERT Advisory CA-1999-11.
RESULT:
TCP Port 32773
QID:66051   Category:RPC   CVE ID:CAN-2002-0084
Vendor Reference:CERT-VN:VU#161931
THREAT:
The Cache File System is a file system caching mechanism developed by Sun that improves NFS performance and scalability. It ships with the Solaris operating environment by default.

A buffer overflow exists in cachefsd that may allow for local attackers to obtain root privileges. The overflow is due to insufficient bounds checking on user-supplied mounts.

Further technical details are forthcoming.

IMPACT:
The successful exploitation of this vulnerability will result in a compromise of the system.
SOLUTION:
There is a workaround and patch available for certain OS versions: Sun info
RESULT:
TCP Port 32775
QID:66049   Category:RPC   CVE ID:CVE-2001-0236
Vendor Reference:26981
THREAT:

Sun Microsystem's Solaris operating environment Versions 2.6, 7, and 8 ship with a service called 'snmpXdmid'.

SNMP and DMI are commonly used remote network and system management protocols. They allow administrators to view and set the properties of network devices and hosts in a standardized manner. To bridge between the two different protocols, Sun Solaris ships with a daemon called 'snmpXdmid', the SNMP to DMI mapping daemon. This service is responsible for receiving DMI requests and translating them to SNMP and vice-versa.

During its operation, snmpXdmid registers itself with RPC service 1000249, 'dmid'. Any received DMI events, or 'indications', are translated by snmpXdmid into SNMP traps. When a specific 'malformed' indication is received by the dmid service, a buffer overflow condition can be triggered. The specific details about how the 'indication' is malformed are not known at this time.

The overflow occurs after snmpXdmid receives the indication and is translating it into an SNMP trap. It is likely that the overflow is stack-based and involves parts or all of a stack frame being overwritten with attacker-supplied data (from within the DMI request).

Note: There are at least three exploits in active use on the Internet.

IMPACT:
It is likely possible to exploit this buffer overflow in a typical stack-overflow manner and execute arbitrary code on the target server. Since the service is initiated by root, any code executed by an attacker would run with super-user privileges.
SOLUTION:
The following patches are available at http://sunsolve.sun.com/securitypatch:

  • OS Version : Patch ID
  • SunOS 5.8 : 108869-07
  • SunOS 5.8_x86 : 108870-07
  • SunOS 5.7 : 107709-15
  • SunOS 5.7_x86 : 107710-15
  • SunOS 5.6 : 106787-15
  • SunOS 5.6_x86 : 106872-15

Job de Haas <job@dot.itsx.com> provided the following workaround in his advisory:
"For 99% of the cases the daemon can be safely turned off by turning off DMI completely. This can be achieved by renaming /etc/rc?.d/S??dmi to /etc/rc?.d/K07dmi and calling '/etc/init.d/init.dmi stop' (where ? is the appropriate runlevel). It is also wise to remove all permissions from the binary: chmod 000 /usr/lib/dmi/snmpXdmid"

RESULT:
UDP Port 32796
TCP Port 32778
QID:38217   Category:General remote services   CVE ID:CAN-2003-0693 CAN-2003-0695 CAN-2003-0682
Vendor Reference:N/A  
THREAT:
Multiple memory management errors have been reported in OpenSSH. These issues exist in the "buffer.c" source file, and may potentially be exploited to execute arbitrary code with the privileges of OpenSSH. The problem appears to be buffer size accounting and related issues, and could result in corruption of heap memory with attacker-supplied values.
IMPACT:
An attacker could exploit this vulnerability to launch a denial of service attack on the SSH service, or to execute arbitrary privileged code on the target.
SOLUTION:
OpenSSH 3.7.1p1 has been released to address this issue. Check the OpenSSH Advisory for the latest information.

Many vendors backport the patches to packages based on earlier versions of openssh. The following packages have been reported to address this issue:
Solaris 9 SPARC: patch 113273-04 or later
Solaris 9 x86: patch 114858-03 or later
AIX-5.2 opensshi-aix52 3.6.1p2_52
AIX-5.1 opensshi-aix51 3.6.1p2_51
HP-UX B.11.22 T1471AA_A.03.61.002_HP-UX_B.11.22_IA.depot
HP-UX B.11.11 T1471AA_A.03.61.002_HP-UX_B.11.11_32+64.depot
HP-UX B.11.00 T1471AA_A.03.61.002_HP-UX_B.11.00_32+64.depot
redhat: openssh-3.1p1-14
fedora: openssh-3.6.1p2-19
mandrake: openssh-3.6.1p2-1.1
debian: openssh-krb5_3.4p1
suse-8.2: openssh-3.5p1-106
suse-8.1, 8-0: openssh-3.4p1-214
Mac OS X 10.2.8

As a workaround, configure OpenSSH to run with privilege separation. This configuration will reduce the impact of any latent vulnerabilities.

RESULT:
SSH-1.99-OpenSSH_3.4p1
QID:74135   Category:Mail services   CVE ID:CAN-2002-1337
Vendor Reference:CERT:CA-2003-07,FREEBSD:FreeBSD-SA-03:04,HP:HPSBUX0302-246
THREAT:
Sendmail is a widely used MTA for Unix and Microsoft Windows systems.

A remotely exploitable vulnerability has been discovered in Sendmail. The vulnerability is due to a buffer overflow condition in the SMTP header parsing component. Remote attackers may exploit this vulnerability by connecting to target SMTP servers and transmitting malformed SMTP data to them.

The overflow condition occurs when Sendmail processes incoming e-mail messages with multiple addresses in a field such as "From:" or "CC:". One of the checks to ensure that the addresses are valid is flawed, resulting in a buffer overflow condition.

Sendmail Versions 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to Version 8.12.8 or apply available patches to prior versions of the 8.x tree.

IMPACT:
This vulnerability may be exploited to gain root privileges on affected servers remotely.
SOLUTION:
RedHat released a security advisory (RHSA-2003:073-06) containing fixes. Upgrade as soon as possible.

SGI released a security advisory (20030301-01-P) containing fixes. Users of IRIX 6.5.15 and later are urged to apply the appropriate patches. Users of IRIX 6.5.14 and earlier should upgrade their installations to IRIX 6.5.20.

Sendmail in OpenBSD-current has been upgraded to Version 8.12.8. Patches have also been released for OpenBSD Versions 3.2 and 3.1. Apply patches or upgrade.

HP released fixes for Tru64 UNIX.

IBM has released a patchs AIXAPAR:IY40500, AIXAPAR:IY40501, AIXAPAR:IY40502 which address this issue.

FreeBSD released an advisory containing a security patch as well as patched binary releases. Users are advised to upgrade as soon as possible. Administrators are advised to upgrade to Version 8.12.8. Patches are available for 8.12.x, 8.11.x, 8.10.x and 8.9.x versions from SendMail's Web site.

RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:20:27 -0700 (PDT)
QID:74136   Category:Mail services   CVE ID:CAN-2003-0161
Vendor Reference:N/A  
THREAT:
Sendmail is a freely available, open-source mail transport agent. It is maintained and distributed by the Sendmail Consortium.

Sendmail is affected by a memory corruption condition that may or may not be remotely exploitable. The potentially exploitable flaw is present in the prescan() procedure, one that is used for processing e-mail addresses in SMTP headers. This function is implemented in the source code file "parseaddr.c".

This vulnerability is due to a logic error in the conversion of a char to an integer value. More information can be obtained from Cert Advisory - CA-2003-12.

IMPACT:
This condition may be exploited by remote attackers to execute instructions on target systems.
SOLUTION:
This issue was fixed in Sendmail Version 8.12.9, which is available for download from Sendmail's Web site. Sendmail has also provided patches for older versions. Upgrade to the latest version or apply the relevant patches.
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:20:27 -0700 (PDT)
QID:27068   Category:File Transfer Protocol   CVE ID:CAN-2001-0249
Vendor Reference:4436988
THREAT:
A buffer overflow occurs when the LIST command is issued with an argument that expands into an oversized string after being processed by glob() functions.

When processing user input, the FTP daemon uses 'glob()' functions to expand wildcards and meta-characters in file paths, just as shells do. A good example of this is use of the tilde (~) character. The glob() function replaces this character in the file path with the path to the user's home directory. The output, an expanded path, is then used by the FTP daemon to construct a command string for the execution of '/bin/ls'. If the source string is too long, then a buffer overflow condition occurs when constructing the command string.

This buffer overflow occurs in memory that is dynamically allocated. It may be possible for attackers to exploit this vulnerability and execute arbitrary code on the affected host. This could be accomplished by overwriting pointers in neighboring malloc headers. If exploited successfully, malloc could be tricked into writing arbitrary values to attacker-supplied locations in memory when free() is called on the targeted chunk. By overwriting something, such as a PLT entry or function return address on the stack, an attacker may be able to execute arbitrary code.

To exploit this, the attacker must be able to create directories on the target host. In most cases, this limits exploitability to local users. On systems where anonymous FTP users can write to a directory, such as 'incoming/', remote exploitation may be a threat.

IMPACT:
The Solaris FTP daemon contains a heap-based buffer overflow condition. If successfully exploited, an attacker may be able to execute arbitrary code on the affected host.
SOLUTION:
Sun has released the following patches to fix this issue

SunOS 5.6 (Patch ID 106301-06)
SunOS 5.7 (Patch ID 110646-05)
SunOS 5.8 (Patch ID 111606-04)

RESULT:
220 demo03.treutler.de FTP server (SunOS 5.8) ready.
QID:50080   Category:Mail services   CVE ID:CAN-2003-0694 CAN-2003-0681
Vendor Reference:CERT:CA-2003-25,RH:RHSA-2003:283,HP:SSRT3631,SCO:CSSA-2003-036.0
THREAT:
Sendmail is prone to a buffer overrun vulnerability in the prescan() function. The issue exists in the "parseaddr.c" source file, and could allow for corruption of stack or heap memory, depending on where in the code the function is called from. One possible attack vector is if the function is indirectly invoked via parseaddr(), although others may also exist.

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

IMPACT:
Successful exploitation of this vulnerability may permit remote attackers to execute arbitrary code via vulnerable versions of Sendmail. Code execution would occur with the privileges of the server. This can also cause a denial of service.
SOLUTION:
This vulnerability is fixed in Sendmail Version 8.12.10. Check Sendmail's Web site to upgrade to this version.
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:20:27 -0700 (PDT)
QID:95004   Category:X-Window   CVE ID:CAN-2002-1317
Vendor Reference:48879
THREAT:
By default the Sun Solaris operating system includes an implementation of the XFS font server, fs.auto. This service allows for X Windows systems to share font information across a network.

A remotely exploitable buffer overrun condition has been reported in the implementation of fs.auto distributed with recent versions of Solaris. Specifically, Solaris 2.5.1, 2.6, 7, 8 & 9 on both the x86 and Sparc architectures ship with a vulnerable binary. The buffer overrun is due to inadequate bounds checking on client-supplied data prior to a sensitive memory copy operation that occurs during the "Dispatch()" routine.

IMPACT:
If the server is running an affected version, remote clients may exploit this condition to execute instructions on the target host by issuing a malicious XFS request. The instructions will execute with user "nobody" privileges, and may result in the attacker gaining local access to the host.
SOLUTION:
Patches from Sun fix this vulnerability on supported Solaris versions. These patches may be downloaded from Sun's SunSolve Web site. Patch information for supported Solaris versions is provided below.
 SPARC
    * Solaris 2.5.1 no-patch
    * Solaris 2.6   patch 108129-05
    * Solaris 7     patch 108117-06
    * Solaris 8     patch 109862-03
    * Solaris 9     patch 113923-02

Intel
    * Solaris 2.5.1 no-patch
    * Solaris 2.6   patch 108130-05
    * Solaris 7     patch 108118-06
    * Solaris 8     patch 109863-03
A patch is not available for Solaris 2.5.1. If you are running Solaris 2.5.1, upgrade to a more recent version so that you can apply a patch.

As a workaround, you can disable the fs.auto service. To disable fs.auto, comment out its entry in the inetd configuration file, and then restart inetd. The entry should appear as:

#fs        stream  tcp     wait nobody /usr/openwin/lib/fs.auto    fs
Be sure to stop and re-start the inetd service. Sending a HUP signal to its process will cause it to re-read "/etc/inetd.conf".
RESULT:
Detected service X11_Font_Service and os SOLARIS 8
QID:50080   Category:Mail services   CVE ID:CAN-2003-0694 CAN-2003-0681
Vendor Reference:CERT:CA-2003-25,RH:RHSA-2003:283,HP:SSRT3631,SCO:CSSA-2003-036.0
THREAT:
Sendmail is prone to a buffer overrun vulnerability in the prescan() function. The issue exists in the "parseaddr.c" source file, and could allow for corruption of stack or heap memory, depending on where in the code the function is called from. One possible attack vector is if the function is indirectly invoked via parseaddr(), although others may also exist.

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

IMPACT:
Successful exploitation of this vulnerability may permit remote attackers to execute arbitrary code via vulnerable versions of Sendmail. Code execution would occur with the privileges of the server. This can also cause a denial of service.
SOLUTION:
This vulnerability is fixed in Sendmail Version 8.12.10. Check Sendmail's Web site to upgrade to this version.
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:31:41 -0700 (PDT)
QID:74135   Category:Mail services   CVE ID:CAN-2002-1337
Vendor Reference:CERT:CA-2003-07,FREEBSD:FreeBSD-SA-03:04,HP:HPSBUX0302-246
THREAT:
Sendmail is a widely used MTA for Unix and Microsoft Windows systems.

A remotely exploitable vulnerability has been discovered in Sendmail. The vulnerability is due to a buffer overflow condition in the SMTP header parsing component. Remote attackers may exploit this vulnerability by connecting to target SMTP servers and transmitting malformed SMTP data to them.

The overflow condition occurs when Sendmail processes incoming e-mail messages with multiple addresses in a field such as "From:" or "CC:". One of the checks to ensure that the addresses are valid is flawed, resulting in a buffer overflow condition.

Sendmail Versions 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to Version 8.12.8 or apply available patches to prior versions of the 8.x tree.

IMPACT:
This vulnerability may be exploited to gain root privileges on affected servers remotely.
SOLUTION:
RedHat released a security advisory (RHSA-2003:073-06) containing fixes. Upgrade as soon as possible.

SGI released a security advisory (20030301-01-P) containing fixes. Users of IRIX 6.5.15 and later are urged to apply the appropriate patches. Users of IRIX 6.5.14 and earlier should upgrade their installations to IRIX 6.5.20.

Sendmail in OpenBSD-current has been upgraded to Version 8.12.8. Patches have also been released for OpenBSD Versions 3.2 and 3.1. Apply patches or upgrade.

HP released fixes for Tru64 UNIX.

IBM has released a patchs AIXAPAR:IY40500, AIXAPAR:IY40501, AIXAPAR:IY40502 which address this issue.

FreeBSD released an advisory containing a security patch as well as patched binary releases. Users are advised to upgrade as soon as possible. Administrators are advised to upgrade to Version 8.12.8. Patches are available for 8.12.x, 8.11.x, 8.10.x and 8.9.x versions from SendMail's Web site.

RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:31:41 -0700 (PDT)
QID:74136   Category:Mail services   CVE ID:CAN-2003-0161
Vendor Reference:N/A  
THREAT:
Sendmail is a freely available, open-source mail transport agent. It is maintained and distributed by the Sendmail Consortium.

Sendmail is affected by a memory corruption condition that may or may not be remotely exploitable. The potentially exploitable flaw is present in the prescan() procedure, one that is used for processing e-mail addresses in SMTP headers. This function is implemented in the source code file "parseaddr.c".

This vulnerability is due to a logic error in the conversion of a char to an integer value. More information can be obtained from Cert Advisory - CA-2003-12.

IMPACT:
This condition may be exploited by remote attackers to execute instructions on target systems.
SOLUTION:
This issue was fixed in Sendmail Version 8.12.9, which is available for download from Sendmail's Web site. Sendmail has also provided patches for older versions. Upgrade to the latest version or apply the relevant patches.
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:31:41 -0700 (PDT)
QID:68507   Category:RPC   CVE ID:CAN-2002-0677
Vendor Reference:N/A  
THREAT:
CDE ships with a daemon called the ToolTalk database server. The ToolTalk database server allows for programs designed for use in CDE to communicate with each other. It is enabled by default on most systems shipped with CDE.

The ToolTalk database server is vulnerable to a condition that may allow NULL words to be written to arbitrary locations in memory. The vulnerability is due to an input validation error in the _TT_ISCLOSE procedure, used by ToolTalk clients to close open ToolTalk databases.

The _TT_ISCLOSE RPC accepts a file descriptor as a parameter. This integer value is used as an index for writing to structures in server memory. There are no checks to restrict the range of the index value. Consequently, malicious file descriptor values supplied by remote clients may cause writes to occur far beyond the table in memory. The only value written is a NULL word, limiting the consequences.

It should be noted that the only authentication required is client-supplied AUTH_UNIX credentials. AUTH_UNIX credentials may be trivially spoofed by attackers.

IMPACT:
Exploitation of this vulnerability could allow for complex attacks, potentially resulting in remote deletion and creation of arbitrary files, or code/command execution.
SOLUTION:
Please read CERT Advisory CA-2002-20 for the latest vendor updates.
RESULT:
TCP Port 32773
QID:68533   Category:RPC   CVE ID:CAN-2003-0027
Vendor Reference:N/A  
THREAT:
The Kodak Color Management System (KCMS) is an image and video management Application Programming Interface (API) for Unix, Linux, and Windows. It is distributed and maintained by Kodak.

A problem could make it possible for a remote user to gain unauthorized remote access to arbitrary files. It has been reported that a problem exists in the Kodak Color Management System (KCMS) due to the insecure handling of input. It may be possible for a remote user to gain access to arbitrary files on a vulnerable host.

This could allow remote information gathering, leakage of sensitive information, and potentially privilege elevation. The problem occurs in the KCS_OPEN_PROFILE. By exploiting a vulnerable system running the kcms_server process, it's possible for a remote user to download any file for which the kcms_server has read access. As the kcms_server process is typically executed as root, this could be any file on the target system. Note that an attacker must use the TT_ISBUILD procedure call of ToolTalk to exploit this issue.

IMPACT:
This vulnerability can be exploited remotely to read arbitrary files on a vulnerable system.
SOLUTION:
A workaround for this vulnerability is to disable the KCMS server. The kcms_server is started by inetd, and may be disabled by commenting out or removing its entry in the inetd.conf.
RESULT:
TCP Port 32774
QID:66050   Category:RPC   CVE ID:CVE-2002-0033 CAN-2002-0085
Vendor Reference:N/A  
THREAT:
The Cache File System is a file system caching mechanism developed by Sun that improves NFS performance and scalability. It ships with the Solaris operating environment by default.

A vulnerability has been reported in the RPC server component of the Cache File System. If an RPC request for an invalid procedure is made, the daemon will crash.

Further technical details are forthcoming.

IMPACT:
The exploitation of this vulnerability could result in a disruption of service or possible loss of data.
SOLUTION:
Workaround: Ensure RPC services are blocked at the firewall.
Otherwise, disable cachefsd.

Solution: Sun has released patches to address this issue. Check the Sun Web Site for updates.

RESULT:
TCP Port 32775
QID:66037   Category:RPC   CVE ID:CVE-1999-0696 CVE-1999-0320
Vendor Reference:SCO:SB-99.12,SUN:00188,SUNBUG:4230754,HP:HPSBUX9908-102
THREAT:
The "cmsd" RPC service is used for managing the calendar and schedule. It contains a widely exploited vulnerability that enables unauthorized users to gain access to servers. By default, "cmsd" listens on the UDP port, and rarely on the TCP port.

Unauthorized users can force the "cmsd" service to bind to a TCP port by exploiting the "cmsd" buffer overflow. Then, they can try to exploit the RPC service listening on the TCP port to obtain a shell. Whether they obtain access or not, a new "cmsd" daemon will be listening on a TCP port (this new entry is registered in the portmapper list).

IMPACT:
If the "cmsd" RPC daemon is listening on a TCP port, then this could indicate that an unauthorized user attempted to exploit the buffer overflow vulnerability. If the attack was successful, then your system may have a trojan installed.
SOLUTION:
If this service is not used, shut down the Calendar service of "cmsd". Otherwise, download a patch provided by your vendor (www.sun.com). You should verify that the host was not compromised.
RESULT:
TCP Port 32785
QID:74141   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Sendmail is a freely available, open-source mail transport agent, which is maintained and distributed by the Sendmail Consortium. Sendmail is available for Unix and Linux systems.

Sendmail uses a general map, which is activated by FEATURE(access_db). This is used by Sendmail to "accept", "reject" or "relay" mail from various hosts, among other actions.

A vulnerability has been discovered in Sendmail that may allow attackers to bypass access restrictions for the check_relay ruleset. Due to this vulnerability, it's possible for atackers to use bogus DNS data to bypass the access restrictions imposed by the access_db FEATURE when used with the check_relay ruleset.

Versions 8.9.0, 8.9.1, 8.9.2, 8.9.3, 8.12.1, 8.12.2, 8.12.3, 8.12.4, 8.12.5 and 8.12.6 are known to be vulnerable.

IMPACT:
An attacker may exploit this vulnerability to connect to a Sendmail server that would otherwise be inaccessible.
SOLUTION:
This vulnerability is fixed in Sendmail Version 8.12.7. Upgrade to the latest version, which is available for download from Sendmail's Web site.
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:20:27 -0700 (PDT)
QID:74141   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Sendmail is a freely available, open-source mail transport agent, which is maintained and distributed by the Sendmail Consortium. Sendmail is available for Unix and Linux systems.

Sendmail uses a general map, which is activated by FEATURE(access_db). This is used by Sendmail to "accept", "reject" or "relay" mail from various hosts, among other actions.

A vulnerability has been discovered in Sendmail that may allow attackers to bypass access restrictions for the check_relay ruleset. Due to this vulnerability, it's possible for atackers to use bogus DNS data to bypass the access restrictions imposed by the access_db FEATURE when used with the check_relay ruleset.

Versions 8.9.0, 8.9.1, 8.9.2, 8.9.3, 8.12.1, 8.12.2, 8.12.3, 8.12.4, 8.12.5 and 8.12.6 are known to be vulnerable.

IMPACT:
An attacker may exploit this vulnerability to connect to a Sendmail server that would otherwise be inaccessible.
SOLUTION:
This vulnerability is fixed in Sendmail Version 8.12.7. Upgrade to the latest version, which is available for download from Sendmail's Web site.
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:31:41 -0700 (PDT)
QID:66017   Category:RPC   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
"rwall" is a service that enables one single user to broadcast a message to all users of a Unix host. This service can be used to impersonate a user and compromise the security of the host running this service.
IMPACT:
The vulnerability is caused by poor user authentication. Rwall can be used in some situations (notably on SunOS) to directly write data to any file on the system.
SOLUTION:
If Rwall is not required on this system, then remove it.
RESULT:
UDP Port 32787
QID:68510   Category:RPC   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A problem in the Common Desktop Environment ToolTalk infrastructure has been discovered. This problem has been reported as affecting the Solaris operating system. Under some circumstances, it may be possible to cause a core dump in ToolTalk. It is currently unknown whether this is an exploitable issue.
IMPACT:
In the case that this is an exploitable memory corruption vulnerability, it may be possible to launch a denial of service, or execute arbitrary code.
SOLUTION:
Users are urged to disable the rpc.ttdbserver process if it is not needed. Limiting access to the ToolTalk RPC database server and possibly the RPC portmapper service is highly recommended.
You can find the ToolTak patches here.
RESULT:
TCP Port 32773
QID:38198   Category:General remote services   CVE ID:CAN-2003-0386
Vendor Reference:N/A  
THREAT:
OpenSSH is a freely available implementation of the SSH client-server protocol. It is distributed and maintained by the OpenSSH team.

A vulnerability has been reported for OpenSSH that may allow unauthorized access to an OpenSSH server's login mechanism. The vulnerability exists in the way OpenSSH restricts access. It's possible to configure OpenSSH to restrict access based on certain hostname or IP address patterns. When a connection is made to an OpenSSH server, a reverse DNS lookup is made to verify the hostname. Access to the login mechanism is then granted based on the lookup response.

An attacker who controls a malicious DNS server may be capable of spoofing a PTR record to mimic the hostname of an authorized user. Furthermore, by using a record containing an IP address of a trusted host, it may also be possible to bypass the access control.

IMPACT:
An attacker can exploit this vulnerability to access the login mechanism of a restricted OpenSSH server. Note that if a target OpenSSH server is configured to carry out key-based authentication, an attacker may be capable of gaining remote access. For this to occur, an attacker must possess a key (such as an RSA key) of a trusted OpenSSH user.
SOLUTION:
As a workaround, these options are available:
  • Enable "VerifyReverseMapping" on the sshd server. This is the vendor-recommended workaround. Note that this option may lead to slow logins when the client doesn't have a reverse DNS server.
  • Consider using tcp-wrappers to restrict access by IP address.
  • Consider using a packet filter or firewall in addition to the OpenSSH restrictions.
RESULT:
SSH-1.99-OpenSSH_3.4p1
QID:74037   Category:Mail services   CVE ID:CAN-1999-0512 CAN-2002-1278 CAN-2003-0285
Vendor Reference:N/A  
THREAT:
The Internet Electronic Mail exchange protocol (SMTP) is designed to work with relays. These days, there is less of a need for relaying functions and, in fact, relaying functions are highly vulnerable to attacks because they allow unauthorized users to connect once to a mail server for a single message. Then, the relaying server distributes the message to thousands of recipients.

It is possible that mail relaying is allowed by the mail server on the host. More details about the specific relaying addresses that are accepted by the mail server are given in the Results section. Since a mail server that accepts a relaying address may be configured not to actually deliver the mail to that address. If this is the case, you may safely ignore this report.

IMPACT:
If mail relaying is indeed allowed, unauthorized Internet users can exploit your Mail server to send anonymous e-mail messages, send massive advertisement messages to unwilling recipients, consume bandwidth or cause denial of service on your servers.
SOLUTION:
Disallow mail relaying if it is allowed. The mail exchanger will need to be reconfigured accordingly.
RESULT:
HELO Treutlerguard.com


250 demo03.treutler.de Hello scanner13.vitry.treutler.de [62.210.136.143], pleased to meet you


MAIL FROM:<qgmrfrom@Treutlerguard.com>


250 2.1.0 <qgmrfrom@Treutlerguard.com>... Sender ok


RCPT TO:<qgmrtest@Treutlerguard.com>


250 2.1.5 <qgmrtest@Treutlerguard.com>... Recipient ok


DATA


354 Enter mail, end with "." on a line by itself


QG mail relay test # 1
.


250 2.0.0 j877KjF11926 Message accepted for delivery


QID:74108   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Sendmail is an MTA (Mail Transport Agent) for Unix and Linux variants.

There is a vulnerability in Sendmail that may lead to a denial of service condition. The vulnerability occurs when a malicious user acquires an exclusive lock on files that Sendmail requires for operation. Sendmail uses file locking for a variety of files including aliases, maps, statistics, and the pid file. If a user has access to these files, the user may be able to obtain exclusive locks on these files. If Sendmail, or its associated programs, is unable to obtain access to any critical files, it will cease to function properly.

IMPACT:
A malicious user may exploit this vulnerability to cause Sendmail to stop functioning.
SOLUTION:
As a workaround, the Sendmail group has suggested changing file permissions on Sendmail related files to prevent unauthorized users from having lock access.

Sendmail Version 8.12.4 changes the existing permissions of sendmail-specific files to prevent access from unauthorized users.

RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:20:27 -0700 (PDT)
QID:74108   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Sendmail is an MTA (Mail Transport Agent) for Unix and Linux variants.

There is a vulnerability in Sendmail that may lead to a denial of service condition. The vulnerability occurs when a malicious user acquires an exclusive lock on files that Sendmail requires for operation. Sendmail uses file locking for a variety of files including aliases, maps, statistics, and the pid file. If a user has access to these files, the user may be able to obtain exclusive locks on these files. If Sendmail, or its associated programs, is unable to obtain access to any critical files, it will cease to function properly.

IMPACT:
A malicious user may exploit this vulnerability to cause Sendmail to stop functioning.
SOLUTION:
As a workaround, the Sendmail group has suggested changing file permissions on Sendmail related files to prevent unauthorized users from having lock access.

Sendmail Version 8.12.4 changes the existing permissions of sendmail-specific files to prevent access from unauthorized users.

RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:31:41 -0700 (PDT)
QID:74037   Category:Mail services   CVE ID:CAN-1999-0512 CAN-2002-1278 CAN-2003-0285
Vendor Reference:N/A  
THREAT:
The Internet Electronic Mail exchange protocol (SMTP) is designed to work with relays. These days, there is less of a need for relaying functions and, in fact, relaying functions are highly vulnerable to attacks because they allow unauthorized users to connect once to a mail server for a single message. Then, the relaying server distributes the message to thousands of recipients.

It is possible that mail relaying is allowed by the mail server on the host. More details about the specific relaying addresses that are accepted by the mail server are given in the Results section. Since a mail server that accepts a relaying address may be configured not to actually deliver the mail to that address. If this is the case, you may safely ignore this report.

IMPACT:
If mail relaying is indeed allowed, unauthorized Internet users can exploit your Mail server to send anonymous e-mail messages, send massive advertisement messages to unwilling recipients, consume bandwidth or cause denial of service on your servers.
SOLUTION:
Disallow mail relaying if it is allowed. The mail exchanger will need to be reconfigured accordingly.
RESULT:
HELO Treutlerguard.com


250 demo03.treutler.de Hello scanner13.vitry.treutler.de [62.210.136.143], pleased to meet you


MAIL FROM:<qgmrfrom@Treutlerguard.com>


250 2.1.0 <qgmrfrom@Treutlerguard.com>... Sender ok


RCPT TO:<qgmrtest@Treutlerguard.com>


250 2.1.5 <qgmrtest@Treutlerguard.com>... Recipient ok


DATA


354 Enter mail, end with "." on a line by itself


QG mail relay test # 1
.


250 2.0.0 j877VxF12210 Message accepted for delivery


QID:66016   Category:RPC   CVE ID:CVE-1999-0626
Vendor Reference:N/A  
THREAT:
The "rusers" RPC service is used from remote systems to check who is connected to a host at any given time. The "rusers" service does not authenticate or perform any kind of access control.

In the Result section, we list the connected users found, if any. We also list the TCP and/or UDP port this vulnerability is detected on.

IMPACT:
Aggressive intruders have been using this service for years to see if the administrator or authorized users are connected before attacking the host or logging on to a system.
SOLUTION:
We strongly advise that you remove Rusers from your system since it is not critical.
RESULT:
UDP Port 32784
TCP Port 32772
QID:66041   Category:RPC   CVE ID:CVE-2000-0666
Vendor Reference:RHSA-2000:043
THREAT:
"nlockmgr" (port 4045) is an RPC service used by NFS (Network File System) to allow NFS clients to perform file locking. There are many different implementations of the protocol on various Operating Systems. The following specific vulnerabilities have been discovered:

First, an obscure exploit has been posted in an underground ezine (crh008.zip). It seems that the RPC "nlockmgr" service is vulnerable to a buffer overflow, and could therefore allow the execution of arbitrary code on the remote host with the privileges of this daemon (usually root). Information about the vulnerable Operating System is not yet available.

Moreover, there is a denial of service vulnerability in the Linux Kernel implementation of "nlockmgr". It is possible to crash this service remotely by sending specially crafted RPC packets to the system.

IMPACT:
Depending on your implementation and version of "nlockmgr", unauthorized users may be able to obtain remote root shell access (even though an exploit exists for this, the vulnerability has never been confirmed) or cause a denial of service on this RPC daemon.
SOLUTION:
If you do not need this RPC daemon, then you should disable it on your server. If you still require it, and you want to firewall NFS access, then you should block the "nlockmgr" port (4045 over UDP and TCP) to prevent unauthorized users from proxying NFS requests.
RESULT:
UDP Port 4045
TCP Port 4045
QID:45017   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Several different techniques can be used to identify the operating system (OS) running on a host. A short description of these techniques is provided below. The specific technique used to identify the OS on this host is included in the RESULTS section of your report.

1) TCP/IP Fingerprint: The operating system of a host can be identified from a remote system using TCP/IP fingerprinting. All underlying operating system TCP/IP stacks have subtle differences that can be seen in their responses to specially-crafted TCP packets. According to the results of this "fingerprinting" technique, the OS version is among those listed below.

Note that if one or more of these subtle differences are modified by a firewall or a packet filtering device between the scanner and the host, the fingerprinting technique may fail. Consequently, the version of the OS may not be detected correctly. If the host is behind a proxy-type firewall, the version of the operating system detected may be that for the firewall instead of for the host being scanned.

2) NetBIOS: Short for Network Basic Input Output System, an application programming interface (API) that augments the DOS BIOS by adding special functions for local-area networks (LANs). Almost all LANs for PCs are based on the NetBIOS. Some LAN manufacturers have even extended it, adding additional network capabilities. NetBIOS relies on a message format called Server Message Block (SMB).

3) PHP Info: PHP is a hypertext pre-processor, an open-source, server-side, HTML-embedded scripting language used to create dynamic Web pages. Under some configurations it is possible to call PHP functions like phpinfo() and obtain operating system information.

4) SNMP: The Simple Network Monitoring Protocol is used to monitor hosts, routers, and the networks to which they attach. The SNMP service maintains Management Information Base (MIB), a set of variables (database) that can be fetched by Managers. These include "MIB_II.system.sysDescr" for the operating system.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Operating SystemTechniqueID
Solaris 8TCP/IP FingerprintU1194:7
QID:82063   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The TCP/IP stack on the host supports the TCP TimeStamp (kind 8) option. Typically the timestamp used is the host's uptime (since last reboot) in various units (e.g., one hundredth of second, one tenth of a second, etc.). Based on this, we can obtain the host's uptime. The result is given in the Result section below.

Some operating systems (e.g., MacOS, OpenBSD) use a non-zero, probably random, initial value for the timestamp. For these operating systems, the uptime obtained does not reflect the actual uptime of the host; the former is always larger than the latter.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Based on TCP timestamps obtained via port 21, the host's uptime is 340 days, 13 hours, and 27
minutes.
The TCP timestamps from the host are in units of 10 milliseconds.
QID:9   Category:RPC   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A port scanner was used to draw a map of all the RPC services accessible from the Internet.
IMPACT:
Unauthorized users can subsequently test vulnerabilities related to each of the services open.
SOLUTION:
Shut down any unknown or unused service on the list. To remove all RPC services, you cannot simply filter port 111 at the firewall because port 111 (the "portmap" service) only shows which ports the RPC services are listening on. Therefore, it cannot block access to these services. Disable the RPC services at the server level because each listens on an ephemeral UDP or TCP port.
RESULT:
programversionprotocolportname
1000002udp111rpcbind
1000004tcp111rpcbind
1000003udp111rpcbind
1000004udp111rpcbind
1000003tcp111rpcbind
1000002tcp111rpcbind
1000014udp32788rstatd
1000013udp32788rstatd
1000012udp32788rstatd
1000023tcp32772rusersd
1000022udp32784rusersd
1000023udp32784rusersd
1000022tcp32772rusersd
1000081udp32787walld
1000111udp32783rquotad
1000121udp32786sprayd
1000211tcp4045nlockmgr
1000214udp4045nlockmgr
1000212udp4045nlockmgr
1000212tcp4045nlockmgr
1000213udp4045nlockmgr
1000214tcp4045nlockmgr
1000211udp4045nlockmgr
1000213tcp4045nlockmgr
1000241tcp32771status
1000241udp32785status
1000683tcp32785cmsd
1000685tcp32785cmsd
1000685udp32789cmsd
1000682tcp32785cmsd
1000682udp32789cmsd
1000684tcp32785cmsd
1000683udp32789cmsd
1000684udp32789cmsd
1000831tcp32773ttdbserverd
1001331udp32785nsm addrand
1001331tcp32771nsm addrand
1002211tcp32774kcms server
10023210udp32782sadmind
1002351tcp32775cachefsd
1002491tcp32778snmpXdmid
1002491udp32796snmpXdmid
3005981udp32795dmispd
3005981tcp32777dmispd
8053063681tcp32777dmispd
8053063681udp32795dmispd
QID:74042   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:20:27 -0700 (PDT)
QID:74145   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Mail Service on this host can be identified from a remote system using SMTP fingerprinting. According to the results of this fingerprinting technique, the Mail Service name and version are listed below.
RESULT:
Name: Sendmail, Version: 8.11.6
QID:27113   Category:File Transfer Protocol   CVE ID:CAN-1999-0614
Vendor Reference:N/A  
THREAT:
The following message is shown to all users logging on to your FTP server, including anonymous logins if they are allowed on your server.
IMPACT:
Unauthorized users can obtain sensitive information about your server, such as the version or type of server you are running, and use this information to implement specific attacks against the server.
SOLUTION:
If possible, edit the configuration files or recompile the server to restrict the type of information disclosed.
RESULT:
220 demo03.treutler.de FTP server (SunOS 5.8) ready.
QID:74042   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
220 demo03.treutler.de ESMTP Sendmail 8.11.6+Sun/8.11.6; Wed, 7 Sep 2005 00:31:41 -0700 (PDT)
QID:74145   Category:Mail services   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Mail Service on this host can be identified from a remote system using SMTP fingerprinting. According to the results of this fingerprinting technique, the Mail Service name and version are listed below.
RESULT:
Name: Sendmail, Version: 8.11.6
QID:6   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The host name of this computer was obtained from a DNS server.
RESULT:
IP addressHost name
XXX.XXX.XXX.XXXdemo03.treutler.de
QID:82040   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. ICMP's principal purpose is to provide a protocol layer that informs gateways of the inter-connectivity and accessibility of other gateways or hosts.

We have sent the following types of packets to trigger the host to send us ICMP replies:

Echo Request (to trigger Echo Reply)
Timestamp Request (to trigger Timestamp Reply)
Address Mask Request (to trigger Address Mask Reply)
UDP Packet (to trigger Port Unreachable Reply)
IP Packet with Protocol >= 250 (to trigger Protocol Unreachable Reply)

Listed in the "Result" section are the ICMP replies that we have received.

RESULT:
ICMP Reply TypeTriggered ByAdditional Information
Address Mask (type=18 code=0)Address Mask Request255.0.0.0
Echo (type=0 code=0)Echo RequestEcho Reply
Timestamp (type=14 code=0)Timestamp Request07:19:05 GMT
Unreachable (type=3 code=2)IP with High ProtocolProtocol Unreachable
Unreachable (type=3 code=3)UDPPort Unreachable
QID:45006   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Traceroute describes the path in realtime from the scanner to the remote host being contacted. It reports the IP addresses of all the routers in between.
RESULT:
HopsIPRound Trip TimeProbe
1195.154.210.1582.12msICMP
2212.129.22.50.42msICMP
3212.129.8.1743.03msICMP
4212.129.8.130.60msICMP
5213.200.76.1930.62msICMP
6213.200.81.25377.58msICMP
7208.173.135.17783.73msICMP
8204.70.192.20683.92msICMP
9204.70.192.149157.29msICMP
10208.172.147.110162.98msICMP
11216.34.3.66157.94msICMP
12XXX.XXX.XXX.XXX158.11msUDP
QID:45004   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This information was gathered using WHOIS service for the target network. Note that this is not all the information that WHOIS service provides.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may help in launching attacks against it.
RESULT:
The network handle is: NET-64-41-128-0-1
Network description:
Savvis
SAVVI-2
QID:45005   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
This information was gathered using the WHOIS service for the network and is believed to be the ISP of the target network.
IMPACT:
This information can be used by malicious users to gather more information about the network infrastructure that may aid in launching further attacks against it.
RESULT:
The ISP network handle is: NET-204-70-0-0-1
ISP Network description:
Savvis
SAVVI-3
QID:45039   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The following host names were discovered for this computer using various methods such as DNS look up, NetBIOS query, and SQL server name query.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Host NameSource
demo03.treutler.deFQDN
demo03.treutler.deRPC SAdmindD
QID:45038   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The Host Scan Time is the period of time it takes the scanning engine to perform the vulnerability assessment of a single target host. The Host Scan Time for this host is reported in the Result section below.

The Host Scan Time does not have a direct correlation to the Duration time as displayed in the Report Summary section of a scan results report. The Duration is the period of time it takes the service to perform a scan task. The Duration includes the time it takes the service to scan all hosts, which may involve parallel scanning. It also includes the time it takes for a scanner appliance to pick up the scan task and transfer the results back to the service's Secure Operating Center. Further, when a scan task is distributed across multiple scanners, the Duration includes the time it takes to perform parallel host scanning on all scanners.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Scan duration: 1300 seconds
QID:82004   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
A port scanner was used to draw a map of all the UDP services on this host that can be accessed from the Internet.

Note that if the host is behind a firewall, there is a small chance that the list includes a few ports that are filtered or blocked by the firewall but are not actually open on the target host. This (false positive on UDP open ports) may happen when the firewall is configured to reject UDP packets for most (but not all) ports with an ICMP Port Unreachable packet. This may also happen when the firewall is configured to allow UDP packets for most (but not all) ports through and filter/block/drop UDP packets for only a few ports. Both cases are uncommon.

IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty working out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site.
RESULT:
PortIANA Assigned Ports/ServicesDescriptionService Detected
7echoEchoecho udp
9discardDiscardunknown
13daytimeDaytimedaytime udp
19chargenCharacter Generatorchargen udp
37timeTimetime udp
111sunrpcSUN Remote Procedure Callrpc udp
161snmpSNMPsnmp
512comsatcomsatunknown
514syslogsyslogunknown
517talklike tenex link, but acrosstalk
QID:82045   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
TCP Initial Sequence Numbers (ISNs) obtained in the SYNACK replies from the host are analyzed to determine how random they are. The average change between subsequent ISNs and the standard deviation from the average are displayed in the RESULT section. Also included is the degree of difficulty for exploitation of the TCP ISN generation scheme used by the host.
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
Average change between subsequent TCP initial sequence numbers is 128024 with a standard deviation
of 37143. These TCP initial sequence numbers were triggered by TCP SYN probes sent to the host at an
average rate of 1/(9992 microseconds). The degree of difficulty to exploit the TCP initial sequence
number generation scheme is: hard.
QID:82023   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The port scanner enables unauthorized users with the appropriate tools to draw a map of all services on this host that can be accessed from the Internet. The test was carried out with a "stealth" port scanner so that the server does not log real connections.
IMPACT:
Unauthorized users can exploit this information to test vulnerabilities in each of the open services.
SOLUTION:
Shut down any unknown or unused service on the list. If you have difficulty figuring out which service is provided by which process or program, contact your provider's support team. For more information about commercial and open-source Intrusion Detection Systems available for detecting port scanners of this kind, visit the CERT Web site.
RESULT:
PortIANA Assigned Ports/ServicesDescriptionService DetectedOS On Redirected Port
7echoEchoecho  
9discardDiscardunknown  
13daytimeDaytimedaytime  
19chargenCharacter Generatorchargen  
21ftpFile Transfer [Control]ftp  
22sshSSH Remote Login Protocolssh  
23telnetTelnettelnet  
25smtpSimple Mail Transfersmtp  
37timeTimetime  
79fingerFingerfinger  
111sunrpcSUN Remote Procedure Callrpc  
512execremote process executionrsh/rexec  
513loginremote login a la telnetrlogin  
514shellcmdrsh/rexec  
515printerspoolerlpd  
540uucpuucpduucp  
587submissionSubmissionsmtp  
898unknownunknownhttp  
4045lockd rpc  
5987unknownunknownunknown  
6112dtspcddtspcddtspcd  
7100font-serviceX Font ServiceX11 Font Service  
32771sometimes-rpc5Sometimes an RPC port on Solaris box (rusersd)rpc  
32772sometimes-rpc7Sometimes an RPC port on Solaris box (status)rpc  
32773sometimes-rpc9Sometimes an RPC port on Solaris box (rquotad)rpc  
32774sometimes-rpc11Sometimes an RPC port on Solaris box (rusersd)rpc  
32775sometimes-rpc13Sometimes an RPC port on Solaris box (status)rpc  
32777sometimes-rpc17Sometimes an RPC port on Solaris box (walld)rpc  
32778sometimes-rpc19Sometimes an RPC port on Solaris box (rstatd)rpc  
32785unknownunknownrpc  
36232unknownunknownunknown  
QID:82053   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The host responds to a TCP SYN packet with at least one of the following flags set with a SYN ACK packet: RST, FIN, ACK, FIN|PSH.
IMPACT:
This behavior in the TCP/IP implementation may allow a remote user to potentially bypass a firewall protecting the host, as some (especially stateless) firewalls may be configured to allow all TCP packets with one of these flags set (RST, FIN, ACK, FIN|PSH) to go through without examining the packets' SYN flag.
SOLUTION:
Many operating systems are known to have this behavior.
RESULT:
Host responded to the following TCP probes to port 21 with SYN+ACK:
SYN+FIN
SYN+FIN+PSH
QID:82046   Category:TCP/IP   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The values for the identification (ID) field in IP headers in IP packets from the host are analyzed to determine how random they are. The changes between subsequent ID values for either the network byte ordering or the host byte ordering, whichever is smaller, are displayed in the RESULT section along with the duration taken to send the probes. When incremental values are used, as is the case for TCP/IP implementation in many operating systems, these changes reflect the network load of the host at the time this test was conducted.
RESULT:
IP ID changes observed (network order) for port 21: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1
Duration: 318 milli seconds
QID:38007   Category:General remote services   CVE ID:CAN-1999-0619
Vendor Reference:N/A  
THREAT:
Telnet banner sometimes provides excessive information about the host.
IMPACT:
If sensitive information is disclosed by the telnet banner, unauthorized users may be able to determine the type of Operating System this host is running, the host name, the domain name and possibly even the name of the Administrator.
SOLUTION:
Do not disclose sensitive information through the telnet banner. Use an encrypted remote session service if available. You might also put a legal advisory on the telnet banner stating:
1. Only authorized persons can connect.
2. All attack attempts will be prosecuted.
3. All connections are logged.
RESULT:


SunOS 5.8

QID:38047   Category:General remote services   CVE ID:CAN-1999-0634
Vendor Reference:N/A  
THREAT:
N/A
IMPACT:
N/A
SOLUTION:
N/A
RESULT:
SSH1 supportedyes
Supported authentification methods for SSH1RSA, keyboard_interactive, password
Supported ciphers for SSH13des, blowfish
SSH2 supportedyes
Supported keys exchange algorithm for SSH2diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1
Supported decryption ciphers for SSH2aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael-cbc@lysator.liu.se
Supported encryption ciphers for SSH2aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, aes192-cbc, aes256-cbc, rijndael-cbc@lysator.liu.se
Supported decryption mac for SSH2hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
Supported encryption mac for SSH2hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-md5-96
Supported authentification methods for SSH2publickey, password, keyboard-interactive
QID:38050   Category:General remote services   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
SSH-1.99-OpenSSH_3.4p1
QID:86000   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
RESULT:
Server VersionServer Banner
Tomcat/2.1Tomcat/2.1
QID:86672   Category:Web server   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
Based largely on the HTTP reply code, the following directories are most likely present on the host.
RESULT:
Directories
/images/
/servlet/
QID:45033   Category:Information gathering   CVE ID:N/A  
Vendor Reference:N/A  
THREAT:
The target Web server supports the TRACE and/or TRACK HTTP methods. These methods allow debugging and connection trace analysis for connections from the client to the Web server. Per the HTTP specification, when this method is used, the Web server echoes back the information sent to it by the client unmodified and unfiltered. Microsoft IIS Web server uses an alias TRACK for the TRACE method, and is functionally the same.

The exact method(s) used are shown in the Results section.

IMPACT:
N/A
SOLUTION:
N/A
RESULT:
TRACE method enabled on / directory

CONFIDENTIAL AND PROPRIETARY INFORMATION. Treutler provides the TreutlerGuard Service "As Is," without any warranty of any kind. Treutler makes no warranty that the information contained in this report is complete or error-free.