Hi all,
I have run nessus against my virtual server.
btw:
- Hosting Server based on RedHat 7.1
- FreeVSD 1.4.9 (RPM installation)
- Skel: freevsd-skel-1_4_9-2rh62
- Tomcat 3.2.2 installed on port 8081
Nessus Scan Report
------------------
SUMMARY
- Number of hosts which were alive during the test : 1
- Number of security holes found : 1
- Number of security warnings found : 10
- Number of security notes found : 11
TESTED HOSTS
vsone (Security holes found)
DETAILS
+ vsone :
. List of open ports :
o ftp (21/tcp) (Security warnings found)
o ssh (22/tcp) (Security notes found)
o telnet (23/tcp) (Security hole found)
o smtp (25/tcp) (Security warnings found)
o http (80/tcp) (Security notes found)
o pop3 (110/tcp) (Security notes found)
o https (443/tcp) (Security warnings found)
o iden-ralp (1725/tcp)
o iberiagames (1726/tcp)
o mysql (3306/tcp)
o unknown (8007/tcp)
o http-alt (8080/tcp) (Security warnings found)
o unknown (8081/tcp) (Security warnings found)
o unknown (8443/tcp) (Security warnings found)
o general/udp (Security notes found)
o general/tcp (Security notes found)
o general/icmp (Security warnings found)
. Warning found on port ftp (21/tcp)
The FTP service allows anonymous logins. If you do not
want to share data with anyone you do not know, then you should
deactivate
the anonymous account, since it can only cause troubles.
Under most Unix system, doing :
echo ftp >> /etc/ftpusers
will correct this.
Risk factor : Low
CVE : CAN-1999-0497
. Information found on port ftp (21/tcp)
Remote FTP server banner :
. Information found on port ssh (22/tcp)
Remote SSH version :
ssh-1.99-openssh_2.9p1
. Vulnerability found on port telnet (23/tcp) :
The Telnet server does not return an expected number of replies
when it receives a long sequence of 'Are You There' commands.
This probably means it overflows one of its internal buffers and
crashes. It is likely an attacker could abuse this bug to gain
control over the remote host's superuser.
For more information, see:
http://www.team-teso.net/advisories/teso-advisory-011.tar.gz
Solution: Comment out the 'telnet' line in /etc/inetd.conf.
Risk factor:
High
. Warning found on port telnet (23/tcp)
The Telnet service is running.
This service is dangerous in the sense that
it is not ciphered - that is, everyone can sniff
the data that passes between the telnet client
and the telnet server. This includes logins
and passwords.
You should disable this service and use OpenSSH instead.
(www.openssh.com)
Solution : Comment out the 'telnet' line in /etc/inetd.conf.
Risk factor : Low
CVE : CAN-1999-0619
. Information found on port telnet (23/tcp)
Remote telnet banner :
Server vsone
login:
. Warning found on port smtp (25/tcp)
The remote SMTP server answers to the EXPN and/or VRFY commands.
The EXPN command can be used to find
the delivery address of mail aliases, or
even the full name of the recipients, and
the VRFY command may be used to check the
validity of an account.
Your mailer should not allow remote users to
use any of these commands, because it gives
them too much informations.
Solution : if you are using sendmail, add the
option
O PrivacyOptions=goaway
in /etc/sendmail.cf.
Risk factor : Low
CVE : CAN-1999-0531
. Information found on port smtp (25/tcp)
Remote SMTP server banner :
vsone ESMTP Sendmail 8.9.3/8.9.3
Wed, 29 Aug 2001 03:53:11 -0400
214-This is Sendmail version 8.9.3214-Topics:
214- HELO EHLO MAIL RCPT DATA
214- RSET NOOP QUIT HELP VRFY
214- EXPN VERB ETRN DSN
214-For more info use "HELP <topic>".
214-To report bugs in the implementation send email to
214- [EMAIL PROTECTED]
214-For local information send email to Postmaster at your site.
214 End of HELP info
. Information found on port http (80/tcp)
The remote web server type is :
Apache/1.3.14 (Unix) (Red-Hat/Linux) PHP/4.0.5
We recommend that you configure your web server to return
bogus versions, so that it makes the cracker job more difficult
. Information found on port pop3 (110/tcp)
The remote POP server banner is :
+OK POP3 Welcome to vm-pop3d 1.1.4 <8806.999071871@vsone>
. Warning found on port https (443/tcp)
a web server is running on this port
. Information found on port https (443/tcp)
The remote web server type is :
Apache/1.3.14 (Unix) (Red-Hat/Linux) PHP/4.0.5
We recommend that you configure your web server to return
bogus versions, so that it makes the cracker job more difficult
. Warning found on port http-alt (8080/tcp)
a web server is running on this
port
. Warning found on port http-alt (8080/tcp)
The misconfigured proxy accepts requests coming
from anywhere. This allows attackers to gain some anonymity when
browsing
some sensitive sites using your proxy, making the remote sites think
that
the requests come from your network.
Solution: Reconfigure the remote proxy so that it only accepts
coming
from inside your network.
Risk factor :
Low/Medium
. Information found on port http-alt (8080/tcp)
The remote web server type is :
Apache/1.3.14 (Unix) (Red-Hat/Linux) PHP/4.0.5
We recommend that you configure your web server to return
bogus versions, so that it makes the cracker job more difficult
. Warning found on port unknown (8081/tcp)
a web server is running on this port
. Warning found on port unknown (8081/tcp)
The 'snoop' tomcat's servlet is installed.
(/examples/jsp/snp/anything.snp)
This servlet gives too much information about
the remote host, such as the PATHs in use,
the host kernel version and so on...
This allows an attacker to gain more knowledge
about this host, and make more precise attacks
thanks to this.
Solution : delete this servlet
Risk factor : Low
CVE : CAN-2000-0760
. Warning found on port unknown (8443/tcp)
a web server is running on this port
. Information found on port unknown (8443/tcp)
The remote web server type is :
Apache/1.3.14 (Unix) (Red-Hat/Linux) PHP/4.0.5
We recommend that you configure your web server to return
bogus versions, so that it makes the cracker job more difficult
. Information found on port general/udp
For your information, here is the traceroute to 1.2.3.4 :
1.2.3.4
1.2.3.5
. Information found on port general/tcp
QueSO has found out that the remote host OS is
* Standard: Solaris 2.x, Linux 2.1.???, Linux 2.2, MacOS
CVE : CAN-1999-0454
. Warning found on port general/icmp
The remote host answers to an ICMP timestamp
request. This allows an attacker to know the
date which is set on your machine.
This may help him to defeat all your
time based authentifications protocols.
Solution : filter out the icmp timestamp
requests (13), and the outgoing icmp
timestamp replies (14).
Risk factor : Low
CVE : CAN-1999-0524
------------------------------------------------------
This file was generated by the Nessus Security Scanner
------------------------------------------------------
-----Urspr�ngliche Nachricht-----
Von: Dave C. [mailto:[EMAIL PROTECTED]]
Gesendet: Dienstag, 28. August 2001 10:33
An: [EMAIL PROTECTED]
Betreff: Security of the provided skel
Hi,
Has anyone run a nessus (or other security probe) agains a running
virtual
server? If so, what are the results?
Dave
------------------------- The freeVSD Support List
--------------------------
Subscribe:
mailto:[EMAIL PROTECTED]?body=subscribe%20freevsd-support
Unsubscribe:
mailto:[EMAIL PROTECTED]?body=unsubscribe%20freevsd-support
Archives: http://freevsd.org/support/mail-archives/freevsd-support
------------------------------------------------------------------------
-----
------------------------- The freeVSD Support List --------------------------
Subscribe: mailto:[EMAIL PROTECTED]?body=subscribe%20freevsd-support
Unsubscribe: mailto:[EMAIL PROTECTED]?body=unsubscribe%20freevsd-support
Archives: http://freevsd.org/support/mail-archives/freevsd-support
-----------------------------------------------------------------------------