Scan Ubuntu With OSSEC + Postfix Prepare For PCI-DSS 0unmp9
Scan Ubuntu With OSSEC + Postfix Prepare For PCI-DSS 0unmp9
Scan Ubuntu With OSSEC + Postfix Prepare For PCI-DSS 0unmp9
Table Of Contents
Hosts Summary (Executive).................................................................................................3
10.42.14.159................................................................................................................................................................ 4
Vulnerabilities By Host......................................................................................................... 5
10.42.14.159................................................................................................................................................................ 6
Vulnerabilities By Plugin.....................................................................................................20
11229 (1) - Web Server info.php / phpinfo.php Detection........................................................................................ 21 12213 (1) - TCP/IP Sequence Prediction Blind Reset Spoofing DoS...................................................................... 22 62101 (1) - Apache 2.2 < 2.2.23 Multiple Vulnerabilities......................................................................................... 24 64912 (1) - Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities......................................................... 25 67140 (1) - OpenSSH LoginGraceTime / MaxStartups DoS.................................................................................... 26 68915 (1) - Apache 2.2 < 2.2.25 Multiple Vulnerabilities......................................................................................... 27 11219 (2) - Nessus SYN scanner.............................................................................................................................28 22964 (2) - Service Detection...................................................................................................................................29 10107 (1) - HTTP Server Type and Version............................................................................................................ 30 10114 (1) - ICMP Timestamp Request Remote Date Disclosure.............................................................................31 10267 (1) - SSH Server Type and Version Information........................................................................................... 32 10287 (1) - Traceroute Information...........................................................................................................................33 10662 (1) - Web mirroring........................................................................................................................................ 34 10881 (1) - SSH Protocol Versions Supported.........................................................................................................35 11032 (1) - Web Server Directory Enumeration....................................................................................................... 36 11936 (1) - OS Identification.....................................................................................................................................37 18261 (1) - Apache Banner Linux Distribution Disclosure........................................................................................38 19506 (1) - Nessus Scan Information.......................................................................................................................39 24260 (1) - HyperText Transfer Protocol (HTTP) Information.................................................................................. 40 25220 (1) - TCP/IP Timestamps Supported............................................................................................................. 41 43111 (1) - HTTP Methods Allowed (per directory)................................................................................................. 42 45590 (1) - Common Platform Enumeration (CPE)..................................................................................................43 54615 (1) - Device Type........................................................................................................................................... 44 66334 (1) - Patch Report.......................................................................................................................................... 45
10.42.14.159 Summary
Critical 0 High 0 Medium 6 Low 0 Info 18 Total 24
Details
Severity Medium (6.9) Medium (5.1) Medium (5.0) Medium (5.0) Medium (5.0) Medium (4.3) Info Info Info Info Info Info Info Info Info Info Info Info Info Info Info Info Info Info Plugin Id 62101 68915 11229 12213 67140 64912 10107 10114 10267 10287 10662 10881 11032 11219 11936 18261 19506 22964 24260 25220 43111 45590 54615 66334 Name Apache 2.2 < 2.2.23 Multiple Vulnerabilities Apache 2.2 < 2.2.25 Multiple Vulnerabilities Web Server info.php / phpinfo.php Detection TCP/IP Sequence Prediction Blind Reset Spoofing DoS OpenSSH LoginGraceTime / MaxStartups DoS Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities HTTP Server Type and Version ICMP Timestamp Request Remote Date Disclosure SSH Server Type and Version Information Traceroute Information Web mirroring SSH Protocol Versions Supported Web Server Directory Enumeration Nessus SYN scanner OS Identification Apache Banner Linux Distribution Disclosure Nessus Scan Information Service Detection HyperText Transfer Protocol (HTTP) Information TCP/IP Timestamps Supported HTTP Methods Allowed (per directory) Common Platform Enumeration (CPE) Device Type Patch Report
Vulnerabilities By Host
Host Information
IP: OS: 10.42.14.159 Linux Kernel 3.5 on Ubuntu 12.10 (quantal)
Results Summary
Critical 0 High 0 Medium 6 Low 0 Info 20 Total 26
Results Details 0/icmp 10114 - ICMP Timestamp Request Remote Date Disclosure Synopsis
It is possible to determine the exact time set on the remote host.
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
References
CVE XREF XREF CVE-1999-0524 OSVDB:94 CWE:200
Plugin Information:
Publication date: 1999/08/01, Modification date: 2012/06/18
Ports icmp/0
The difference between the local and remote clocks is 1 second.
0/tcp 12213 - TCP/IP Sequence Prediction Blind Reset Spoofing DoS Synopsis
It may be possible to send spoofed RST packets to the remote system.
Description
The remote host might be affected by a sequence number approximation vulnerability that may allow an attacker to send spoofed RST packets to the remote host and close established connections. This may cause problems for some dedicated services (BGP, a VPN over TCP, etc).
See Also
https://downloads.avaya.com/elmodocs2/security/ASA-2006-217.htm
http://www.kb.cert.org/vuls/id/JARL-5ZQR4D http://www-01.ibm.com/support/docview.wss?uid=isg1IY55949 http://www-01.ibm.com/support/docview.wss?uid=isg1IY55950 http://www-01.ibm.com/support/docview.wss?uid=isg1IY62006 http://www.juniper.net/support/security/alerts/niscc-236929.txt http://technet.microsoft.com/en-us/security/bulletin/ms05-019 http://technet.microsoft.com/en-us/security/bulletin/ms06-064 http://www.kb.cert.org/vuls/id/JARL-5YGQ9G http://www.kb.cert.org/vuls/id/JARL-5ZQR7H http://www.kb.cert.org/vuls/id/JARL-5YGQAJ http://www.nessus.org/u?9a548ae4 http://isc.sans.edu/diary.html?date=2004-04-20
Solution
Contact the vendor for a patch or mitigation advice.
Risk Factor
Medium
References
BID CVE XREF XREF XREF XREF 10183 CVE-2004-0230 OSVDB:4030 CERT:415294 EDB-ID:276 EDB-ID:291
Plugin Information:
Publication date: 2004/04/25, Modification date: 2012/12/28
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
See Also
http://www.ietf.org/rfc/rfc1323.txt
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/05/16, Modification date: 2011/03/20
Description
This script extracts the banner of the Apache web server and attempts to determine which Linux distribution the remote host is running.
Solution
If you do not wish to display this information, edit httpd.conf and set the directive 'ServerTokens Prod' and restart Apache.
Risk Factor
None
Plugin Information:
Publication date: 2005/05/15, Modification date: 2013/08/10
Ports tcp/0
The linux - Ubuntu - Ubuntu - Ubuntu distribution detected was : 12.04 (precise) 12.10 (quantal) 13.04 (raring)
Description
Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc...), it is possible to guess the name of the remote operating system in use. It is also sometimes possible to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2003/12/09, Modification date: 2013/09/03
Ports tcp/0
Remote operating system : Linux Kernel 3.5 on Ubuntu 12.10 (quantal) Confidence Level : 95 Method : SSH
The remote host is running Linux Kernel 3.5 on Ubuntu 12.10 (quantal)
Synopsis
It is possible to guess the remote device type.
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2011/05/23, Modification date: 2011/05/23
Ports tcp/0
Remote device type : general-purpose Confidence level : 95
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
http://cpe.mitre.org/
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2010/04/21, Modification date: 2013/09/18
Ports tcp/0
The remote operating system matched the following CPE : cpe:/o:canonical:ubuntu_linux:12.10 -> Canonical Ubuntu Linux 12.10 Following application CPE's matched on the remote system : cpe:/a:openbsd:openssh:6.0 -> OpenBSD OpenSSH 6.0 cpe:/a:apache:http_server:2.2.22 -> Apache Software Foundation Apache HTTP Server 2.2.22
Description
The remote host is missing one or several security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.
Solution
Install the patches listed below
Risk Factor 9
None
Plugin Information:
Publication date: 2013/05/07, Modification date: 2013/09/13
Ports tcp/0
. You need to take the following 2 actions: [ OpenSSH LoginGraceTime / MaxStartups DoS (67140) ] + Action to take: Upgrade to OpenSSH 6.2 and review the associated server configuration settings.
[ Apache 2.2 < 2.2.25 Multiple Vulnerabilities (68915) ] + Action to take: Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.25 or later. + Impact: Taking this action will resolve 6 different vulnerabilities (CVEs).
Description
This script displays, for each tested host, information about the scan itself : - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - Whether credentialed or third-party patch management checks are possible - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2005/08/26, Modification date: 2013/09/17
Ports tcp/0
Information about this scan : Nessus version : 5.2.2 Plugin feed version : 201309251115 Type of plugin feed : HomeFeed (Non-commercial use only) Scanner IP : 10.42.12.28 Port scanner(s) : nessus_syn_scanner Port range : 1-65535 Thorough tests : no Experimental tests : no Paranoia level : 2 Report Verbosity : 1 Safe checks : yes Optimize the test : yes Credentialed checks : no Patch management checks : None
10
CGI scanning : enabled Web application tests : enabled Web app tests - Test mode : single Web app tests - Try all HTTP methods : yes Web app tests - Maximum run time : 10 minutes. Web app tests - Stop at first flaw : param Max hosts : 20 Max checks : 4 Recv timeout : 15 Backports : None Allow post-scan editing: Yes Scan Start Date : 2013/9/26 4:38 Scan duration : 142 sec
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 1999/11/27, Modification date: 2013/04/11
Ports udp/0
For your information, here is the traceroute from 10.42.12.28 to 10.42.14.159 : 10.42.12.28 10.42.12.1 10.42.14.159
Description
According to its banner, a version of OpenSSH earlier than version 6.2 is listening on this port. The default configuration of OpenSSH installs before 6.2 could allow a remote attacker to bypass the LoginGraceTime and MaxStartups thresholds by periodically making a large number of new TCP connections and thereby prevent legitimate users from gaining access to the service. Note that this plugin has not tried to exploit the issue or detect whether the remote service uses a vulnerable configuration. Instead, it has simply checked the version of OpenSSH running on the remote host.
See Also
http://www.openwall.com/lists/oss-security/2013/02/06/5 http://openssh.org/txt/release-6.2 http://tools.cisco.com/security/center/viewAlert.x?alertId=28883
Solution
Upgrade to OpenSSH 6.2 and review the associated server configuration settings.
Risk Factor
Medium
3.7 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
References
BID CVE XREF 58162 CVE-2010-5107 OSVDB:90007
Plugin Information:
Publication date: 2013/07/03, Modification date: 2013/07/03
Ports tcp/22
Version source : SSH-2.0-OpenSSH_6.0p1 Debian-3ubuntu1 Installed version : 6.0p1 Fixed version : 6.2
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2013/08/07
Ports tcp/22
Port 22/tcp was found to be open
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/08/19, Modification date: 2013/09/19
Ports tcp/22
An SSH server is running on this port.
12
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 1999/10/12, Modification date: 2011/10/24
Ports tcp/22
SSH version : SSH-2.0-OpenSSH_6.0p1 Debian-3ubuntu1 SSH supported authentication : publickey,password
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2002/03/06, Modification date: 2012/04/04
Ports tcp/22
The remote SSH daemon supports the following versions of the SSH protocol : - 1.99 - 2.0
Description
Many PHP installation tutorials instruct the user to create a PHP file that calls the PHP function 'phpinfo()' for debugging purposes. Various PHP applications may also include such a file. By accessing such a file, a remote attacker can discover a large amount of information about the remote web server, including : - The username of the user who installed php and if they are a SUDO user. - The IP address of the host. - The version of the operating system. - The web server version. - The root directory of the web server. - Configuration information about the remote PHP installation.
Solution
Remove the affected file(s).
Risk Factor
Medium
13
Plugin Information:
Publication date: 2003/02/12, Modification date: 2013/01/25
Ports tcp/80
Nessus discovered the following URL that calls phpinfo() : - http://10.42.14.159/info.php
Description
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.23. It is, therefore, potentially affected by the following vulnerabilities: - The utility 'apachectl' can receive a zero-length directory name in the LD_LIBRARY_PATH via the 'envvars' file. A local attacker with access to that utility could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary code execution. (CVE-2012-0883) - An input validation error exists related to 'mod_negotiation', 'Multiviews' and untrusted uploads that can allow crosssite scripting attacks. (CVE-2012-2687) Note that Nessus did not actually test for these flaws, but instead has relied on the version in the server's banner.
See Also
http://www.apache.org/dist/httpd/CHANGES_2.2.23 http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.23 or later.
Risk Factor
Medium
References
BID BID CVE CVE XREF XREF 53046 55131 CVE-2012-0883 CVE-2012-2687 OSVDB:81359 OSVDB:84818
Plugin Information:
Publication date: 2012/09/14, Modification date: 2013/07/20
Ports tcp/80
14
Version source : Server: Apache/2.2.22 Installed version : 2.2.22 Fixed version : 2.2.23
64912 - Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities Synopsis
The remote web server may be affected by multiple cross-site scripting vulnerabilities.
Description
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.24. It is, therefore, potentially affected by the following cross-site scripting vulnerabilities : - Errors exist related to the modules mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp and unescaped hostnames and URIs that could allow cross- site scripting attacks. (CVE-2012-3499) - An error exists related to the mod_proxy_balancer module's manager interface that could allow cross-site scripting attacks. (CVE-2012-4558) Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
http://www.apache.org/dist/httpd/CHANGES_2.2.24 http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.24 or later.
Risk Factor
Medium
References
BID CVE CVE XREF XREF 58165 CVE-2012-3499 CVE-2012-4558 OSVDB:90556 OSVDB:90557
Plugin Information:
Publication date: 2013/02/27, Modification date: 2013/09/15
Ports tcp/80
Version source : Server: Apache/2.2.22 Installed version : 2.2.22 Fixed version : 2.2.24
Description
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.25. It is, therefore, potentially affected by the following vulnerabilities : - A flaw exists in the 'RewriteLog' function where it fails to sanitize escape sequences from being written to log files, making it potentially vulnerable to arbitrary command execution. (CVE-2013-1862) - A denial of service vulnerability exists relating to the 'mod_dav' module as it relates to MERGE requests. (CVE-2013-1896)
15
Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
http://www.apache.org/dist/httpd/CHANGES_2.2.25 http://httpd.apache.org/security/vulnerabilities_22.html http://www.nessus.org/u?f050c342
Solution
Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.25 or later.
Risk Factor
Medium
STIG Severity
I
References
BID BID CVE CVE XREF XREF XREF 59826 61129 CVE-2013-1862 CVE-2013-1896 OSVDB:93366 OSVDB:95498 IAVA:2013-A-0146
Plugin Information:
Publication date: 2013/07/16, Modification date: 2013/09/15
Ports tcp/80
Version source : Server: Apache/2.2.22 Installed version : 2.2.22 Fixed version : 2.2.25
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
16
Ports tcp/80
Port 80/tcp was found to be open
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/08/19, Modification date: 2013/09/19
Ports tcp/80
A web server is running on this port.
Description
This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not.
See Also
http://projects.webappsec.org/Predictable-Resource-Location
Solution
n/a
Risk Factor
None
References
XREF OWASP:OWASP-CM-006
Plugin Information:
Publication date: 2002/06/26, Modification date: 2013/04/02
Ports tcp/80
The following directories were discovered: /cgi-bin, /icons While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards
Description
This script makes a mirror of the remote web site(s) and extracts the list of CGIs that are used by the remote host.
17
It is suggested that you change the number of pages to mirror in the 'Options' section of the client.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/05/04, Modification date: 2013/04/11
Ports tcp/80
Webmirror performed 9 queries in 1s (9.000 queries per second)
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2000/01/04, Modification date: 2013/06/03
Ports tcp/80
The remote web server type is : Apache/2.2.22 (Ubuntu) You can set the directive 'ServerTokens Prod' to limit the information emanating from the server in its response headers.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory. As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501. Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2009/12/10, Modification date: 2013/05/09
Ports tcp/80
Based on the response to an OPTIONS request :
18
- HTTP methods GET HEAD OPTIONS POST are allowed on : / /icons /manager /recipe
Based on tests of each method : - HTTP methods ACL BASELINE-CONTROL BCOPY BDELETE BMOVE BPROPFIND BPROPPATCH CHECKIN CHECKOUT COPY DEBUG DELETE GET HEAD INDEX LABEL LOCK MERGE MKACTIVITY MKCOL MKWORKSPACE MOVE NOTIFY OPTIONS ORDERPATCH PATCH POLL POST PROPFIND PROPPATCH PUT REPORT RPC_IN_DATA RPC_OUT_DATA SEARCH SUBSCRIBE UNCHECKOUT UNLOCK UNSUBSCRIBE UPDATE VERSION-CONTROL X-MS-ENUMATTS are allowed on : /cgi-bin - HTTP methods GET HEAD OPTIONS POST are allowed on : / /icons /manager /recipe - Invalid/unknown HTTP methods are allowed on : /cgi-bin
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/01/30, Modification date: 2011/05/31
Ports tcp/80
Protocol version : HTTP/1.1 SSL : no Keep-Alive : yes Options allowed : (Not implemented) Headers : Date: Wed, 25 Sep 2013 21:40:20 GMT Server: Apache/2.2.22 (Ubuntu) Last-Modified: Thu, 05 Sep 2013 16:38:50 GMT ETag: "2c14-b1-4e5a58e89f052" Accept-Ranges: bytes Content-Length: 177 Vary: Accept-Encoding Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html
19
Vulnerabilities By Plugin
Description
Many PHP installation tutorials instruct the user to create a PHP file that calls the PHP function 'phpinfo()' for debugging purposes. Various PHP applications may also include such a file. By accessing such a file, a remote attacker can discover a large amount of information about the remote web server, including : - The username of the user who installed php and if they are a SUDO user. - The IP address of the host. - The version of the operating system. - The web server version. - The root directory of the web server. - Configuration information about the remote PHP installation.
Solution
Remove the affected file(s).
Risk Factor
Medium
Plugin Information:
Publication date: 2003/02/12, Modification date: 2013/01/25
21
12213 (1) - TCP/IP Sequence Prediction Blind Reset Spoofing DoS Synopsis
It may be possible to send spoofed RST packets to the remote system.
Description
The remote host might be affected by a sequence number approximation vulnerability that may allow an attacker to send spoofed RST packets to the remote host and close established connections. This may cause problems for some dedicated services (BGP, a VPN over TCP, etc).
See Also
https://downloads.avaya.com/elmodocs2/security/ASA-2006-217.htm http://www.kb.cert.org/vuls/id/JARL-5ZQR4D http://www-01.ibm.com/support/docview.wss?uid=isg1IY55949 http://www-01.ibm.com/support/docview.wss?uid=isg1IY55950 http://www-01.ibm.com/support/docview.wss?uid=isg1IY62006 http://www.juniper.net/support/security/alerts/niscc-236929.txt http://technet.microsoft.com/en-us/security/bulletin/ms05-019 http://technet.microsoft.com/en-us/security/bulletin/ms06-064 http://www.kb.cert.org/vuls/id/JARL-5YGQ9G http://www.kb.cert.org/vuls/id/JARL-5ZQR7H http://www.kb.cert.org/vuls/id/JARL-5YGQAJ http://www.nessus.org/u?9a548ae4 http://isc.sans.edu/diary.html?date=2004-04-20
Solution
Contact the vendor for a patch or mitigation advice.
Risk Factor
Medium
References
BID CVE XREF XREF XREF XREF 10183 CVE-2004-0230 OSVDB:4030 CERT:415294 EDB-ID:276 EDB-ID:291
Plugin Information: 22
23
Description
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.23. It is, therefore, potentially affected by the following vulnerabilities: - The utility 'apachectl' can receive a zero-length directory name in the LD_LIBRARY_PATH via the 'envvars' file. A local attacker with access to that utility could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary code execution. (CVE-2012-0883) - An input validation error exists related to 'mod_negotiation', 'Multiviews' and untrusted uploads that can allow crosssite scripting attacks. (CVE-2012-2687) Note that Nessus did not actually test for these flaws, but instead has relied on the version in the server's banner.
See Also
http://www.apache.org/dist/httpd/CHANGES_2.2.23 http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Upgrade to Apache version 2.2.23 or later.
Risk Factor
Medium
References
BID BID CVE CVE XREF XREF 53046 55131 CVE-2012-0883 CVE-2012-2687 OSVDB:81359 OSVDB:84818
Plugin Information:
Publication date: 2012/09/14, Modification date: 2013/07/20
24
64912 (1) - Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilities Synopsis
The remote web server may be affected by multiple cross-site scripting vulnerabilities.
Description
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.24. It is, therefore, potentially affected by the following cross-site scripting vulnerabilities : - Errors exist related to the modules mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp and unescaped hostnames and URIs that could allow cross- site scripting attacks. (CVE-2012-3499) - An error exists related to the mod_proxy_balancer module's manager interface that could allow cross-site scripting attacks. (CVE-2012-4558) Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
http://www.apache.org/dist/httpd/CHANGES_2.2.24 http://httpd.apache.org/security/vulnerabilities_22.html
Solution
Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.24 or later.
Risk Factor
Medium
References
BID CVE CVE XREF XREF 58165 CVE-2012-3499 CVE-2012-4558 OSVDB:90556 OSVDB:90557
Plugin Information:
Publication date: 2013/02/27, Modification date: 2013/09/15
25
Description
According to its banner, a version of OpenSSH earlier than version 6.2 is listening on this port. The default configuration of OpenSSH installs before 6.2 could allow a remote attacker to bypass the LoginGraceTime and MaxStartups thresholds by periodically making a large number of new TCP connections and thereby prevent legitimate users from gaining access to the service. Note that this plugin has not tried to exploit the issue or detect whether the remote service uses a vulnerable configuration. Instead, it has simply checked the version of OpenSSH running on the remote host.
See Also
http://www.openwall.com/lists/oss-security/2013/02/06/5 http://openssh.org/txt/release-6.2 http://tools.cisco.com/security/center/viewAlert.x?alertId=28883
Solution
Upgrade to OpenSSH 6.2 and review the associated server configuration settings.
Risk Factor
Medium
References
BID CVE XREF 58162 CVE-2010-5107 OSVDB:90007
Plugin Information:
Publication date: 2013/07/03, Modification date: 2013/07/03
26
Description
According to its banner, the version of Apache 2.2 installed on the remote host is earlier than 2.2.25. It is, therefore, potentially affected by the following vulnerabilities : - A flaw exists in the 'RewriteLog' function where it fails to sanitize escape sequences from being written to log files, making it potentially vulnerable to arbitrary command execution. (CVE-2013-1862) - A denial of service vulnerability exists relating to the 'mod_dav' module as it relates to MERGE requests. (CVE-2013-1896) Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.
See Also
http://www.apache.org/dist/httpd/CHANGES_2.2.25 http://httpd.apache.org/security/vulnerabilities_22.html http://www.nessus.org/u?f050c342
Solution
Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.25 or later.
Risk Factor
Medium
STIG Severity
I
References
BID BID CVE CVE XREF XREF XREF 59826 61129 CVE-2013-1862 CVE-2013-1896 OSVDB:93366 OSVDB:95498 IAVA:2013-A-0146
Plugin Information:
Publication date: 2013/07/16, Modification date: 2013/09/15
27
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2013/08/07
10.42.14.159 (tcp/80)
Port 80/tcp was found to be open
28
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/08/19, Modification date: 2013/09/19
10.42.14.159 (tcp/80)
A web server is running on this port.
29
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2000/01/04, Modification date: 2013/06/03
30
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
References
CVE XREF XREF CVE-1999-0524 OSVDB:94 CWE:200
Plugin Information:
Publication date: 1999/08/01, Modification date: 2012/06/18
31
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 1999/10/12, Modification date: 2011/10/24
32
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 1999/11/27, Modification date: 2013/04/11
33
Description
This script makes a mirror of the remote web site(s) and extracts the list of CGIs that are used by the remote host. It is suggested that you change the number of pages to mirror in the 'Options' section of the client.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/05/04, Modification date: 2013/04/11
34
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2002/03/06, Modification date: 2012/04/04
35
Description
This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not.
See Also
http://projects.webappsec.org/Predictable-Resource-Location
Solution
n/a
Risk Factor
None
References
XREF OWASP:OWASP-CM-006
Plugin Information:
Publication date: 2002/06/26, Modification date: 2013/04/02
36
Description
Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc...), it is possible to guess the name of the remote operating system in use. It is also sometimes possible to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2003/12/09, Modification date: 2013/09/03
The remote host is running Linux Kernel 3.5 on Ubuntu 12.10 (quantal)
37
Description
This script extracts the banner of the Apache web server and attempts to determine which Linux distribution the remote host is running.
Solution
If you do not wish to display this information, edit httpd.conf and set the directive 'ServerTokens Prod' and restart Apache.
Risk Factor
None
Plugin Information:
Publication date: 2005/05/15, Modification date: 2013/08/10
38
Description
This script displays, for each tested host, information about the scan itself : - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - Whether credentialed or third-party patch management checks are possible - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2005/08/26, Modification date: 2013/09/17
39
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc... This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/01/30, Modification date: 2011/05/31
40
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
See Also
http://www.ietf.org/rfc/rfc1323.txt
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/05/16, Modification date: 2011/03/20
41
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory. As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes' in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501. Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2009/12/10, Modification date: 2013/05/09
Based on tests of each method : - HTTP methods ACL BASELINE-CONTROL BCOPY BDELETE BMOVE BPROPFIND BPROPPATCH CHECKIN CHECKOUT COPY DEBUG DELETE GET HEAD INDEX LABEL LOCK MERGE MKACTIVITY MKCOL MKWORKSPACE MOVE NOTIFY OPTIONS ORDERPATCH PATCH POLL POST PROPFIND PROPPATCH PUT REPORT RPC_IN_DATA RPC_OUT_DATA SEARCH SUBSCRIBE UNCHECKOUT UNLOCK UNSUBSCRIBE UPDATE VERSION-CONTROL X-MS-ENUMATTS are allowed on : /cgi-bin - HTTP methods GET HEAD OPTIONS POST are allowed on : / /icons /manager /recipe - Invalid/unknown HTTP methods are allowed on : /cgi-bin
42
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host. Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
http://cpe.mitre.org/
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2010/04/21, Modification date: 2013/09/18
43
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2011/05/23, Modification date: 2011/05/23
44
Description
The remote host is missing one or several security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.
Solution
Install the patches listed below
Risk Factor
None
Plugin Information:
Publication date: 2013/05/07, Modification date: 2013/09/13
. You need to take the following 2 actions: [ OpenSSH LoginGraceTime / MaxStartups DoS (67140) ] + Action to take: Upgrade to OpenSSH 6.2 and review the associated server configuration settings.
[ Apache 2.2 < 2.2.25 Multiple Vulnerabilities (68915) ] + Action to take: Either ensure that the affected modules are not in use or upgrade to Apache version 2.2.25 or later. + Impact: Taking this action will resolve 6 different vulnerabilities (CVEs).
45