2003 Tech Report
2003 Tech Report
IP: 192.168.0.122
4 2 7 2 72 87
Results Details
0/icmp
11197 - Multiple Ethernet Driver Frame Padding Information Disclosure (Etherleak)
Synopsis
The remote host appears to leak memory in network packets.
Description
The remote host uses a network device driver that pads ethernet frames with data which vary from one packet to
another, likely taken from kernel memory, system memory allocated to the device driver, or a hardware buffer on its
network interface card.
Known as 'Etherleak', this information disclosure vulnerability may allow an attacker to collect sensitive information
from the affected host provided he is on the same physical subnet as that host.
See Also
http://www.nessus.org/u?719c90b4
Solution
Contact the network device driver's vendor for a fix.
Risk Factor
Low
CVSS Base Score
3.3 (CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
2.9 (CVSS2#E:ND/RL:OF/RC:C)
References
BID 6535
CVE CVE-2003-0001
XREF OSVDB:3873
Plugin Information:
Publication date: 2003/01/14, Modification date: 2015/01/21
Ports
icmp/0
4
0x00: 0E A1 E3 80 18 FA F0 A8 ED 00 00 01 01 08 0A 00 ................
0x10: 01 .
0x00: 07 4E 67 B0 12 FA F0 F2 25 00 00 02 04 05 B4 01 .Ng.....%.......
0x10: 03 .
XREF OSVDB:94
XREF CWE:200
Plugin Information:
Publication date: 1999/08/01, Modification date: 2012/06/18
Ports
icmp/0
The ICMP timestamps seem to be in little endian format (not in network format)
The difference between the local and remote clocks is -79 seconds.
0/tcp
84729 - Microsoft Windows Server 2003 Unsupported Installation Detection
Synopsis
The remote operating system is no longer supported.
Description
The remote host is running Microsoft Windows Server 2003. Support for this operating system by Microsoft ended July
14th, 2015.
Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is
likely to contain security vulnerabilities. Furthermore, Microsoft is unlikely to investigate or acknowledge reports of
vulnerabilities.
See Also
http://www.nessus.org/u?c0dbe792
Solution
Upgrade to a version of Windows that is currently supported.
Risk Factor
Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information:
5
Publication date: 2015/07/14, Modification date: 2015/10/21
Ports
tcp/0
24786 - Nessus Windows Scan Not Performed with Admin Privileges
Synopsis
The Nessus scan of this host may be incomplete due to insufficient privileges provided.
Description
The Nessus scanner testing the remote host has been given SMB credentials to log into the remote host, however
these credentials do not have administrative privileges.
Typically, when Nessus performs a patch audit, it logs into the remote host and reads the version of the DLLs on
the remote host to determine if a given patch has been applied or not. This is the method Microsoft recommends to
determine if a patch has been applied.
If your Nessus scanner does not have administrative privileges when doing a scan, then Nessus has to fall back to
perform a patch audit through the registry which may lead to false positives (especially when using third-party patch
auditing tools) or to false negatives (not all patches can be detected through the registry).
Solution
Reconfigure your scanner to use credentials with administrative privileges.
Risk Factor
None
Plugin Information:
Publication date: 2007/03/12, Modification date: 2013/01/07
Ports
tcp/0
6
http://www.nessus.org/u?794673b4
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2009/02/19, Modification date: 2015/10/16
Ports
tcp/0
11936 - OS Identification
Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name
of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2003/12/09, Modification date: 2016/02/24
Ports
tcp/0
Not all fingerprints could give a match. If you think some or all of
the following could be used to identify the host's operating system,
please email them to os-signatures@nessus.org. Be sure to include a
brief description of the host itself, such as the actual operating
system or product / model names.
NTP:!:unknown
SinFP:
P1:B11013:F0x12:W64240:O0204ffff:M1460:
P2:B11013:F0x12:W64240:O0204ffff010303000101080a000000000000000001010402:M1460:
P3:B11021:F0x04:W0:O0:M0
P4:6602_7_p=53
SMTP:220 kumar.Kumar Microsoft ESMTP MAIL Service, Version: 6.0.3790.3959 ready at Thu, 28 Apr
2016 13:29:05 +0530
RDP:000000000f00000010000100080001000b000000030010001000c00007
The remote host is running Microsoft Windows Server 2003 Service Pack 2
7
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2011/05/23, Modification date: 2011/05/23
Ports
tcp/0
Remote device type : general-purpose
Confidence level : 99
https://nvd.nist.gov/cpe.cfm
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2010/04/21, Modification date: 2014/11/20
Ports
tcp/0
8
. You need to take the following 2 actions :
[ MS10-024: Vulnerabilities in Microsoft Exchange and Windows SMTP Service Could Allow Denial of
Service (981832) (uncredentialed check) (45517) ]
+ Action to take :
[ MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)
(uncredentialed check) (58435) ]
+ Action to take :
9
Scan Start Date : 2016/4/28 3:56 EDT
Scan duration : 216 sec
0/udp
10287 - Traceroute Information
Synopsis
It was possible to obtain traceroute information.
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 1999/11/27, Modification date: 2013/04/11
Ports
udp/0
For your information, here is the traceroute from 192.168.0.123 to 192.168.0.122 :
192.168.0.123
192.168.0.122
25/tcp
45517 - MS10-024: Vulnerabilities in Microsoft Exchange and Windows SMTP Service Could Allow
Denial of Service (981832) (uncredentialed check)
Synopsis
The remote mail server may be affected by multiple vulnerabilities.
Description
The installed version of Microsoft Exchange / Windows SMTP Service is affected by at least one vulnerability :
- Incorrect parsing of DNS Mail Exchanger (MX) resource records could cause the Windows Simple Mail Transfer
Protocol (SMTP) component to stop responding until the service is restarted. (CVE-2010-0024)
- Improper allocation of memory for interpreting SMTP command responses may allow an attacker to read random
email message fragments stored on the affected server.
(CVE-2010-0025)
Solution
Microsoft has released a set of patches for Windows 2000, XP, 2003, and 2008 as well as Exchange Server 2000,
2003, 2007, and 2010 :
http://technet.microsoft.com/en-us/security/bulletin/MS10-024
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score
3.9 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
II
References
BID 39381
CVE CVE-2010-0024
CVE CVE-2010-0025
XREF OSVDB:63738
10
XREF OSVDB:63739
XREF MSFT:MS10-024
XREF IAVB:2010-B-0029
Exploitable with
Core Impact (true)
Plugin Information:
Publication date: 2010/04/13, Modification date: 2014/07/11
Ports
tcp/25
11
The remote host is running a mail (SMTP) server on this port.
Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.
Solution
Disable this service if you do not use it, or filter incoming traffic to this port.
Risk Factor
None
Plugin Information:
Publication date: 1999/10/12, Modification date: 2011/03/11
Ports
tcp/25
220 kumar.Kumar Microsoft ESMTP MAIL Service, Version: 6.0.3790.3959 ready at Thu, 28 Apr 2016
13:29:05 +0530
42/tcp
40564 - MS09-039: Vulnerabilities in WINS Could Allow Remote Code Execution (969883)
(uncredentialed check)
Synopsis
Arbitrary code can be executed on the remote host through the WINS service
Description
The remote host has a Windows WINS server installed.
The remote version of this server has two vulnerabilities that may allow an attacker to execute arbitrary code on the
remote system:
- One heap overflow vulnerability can be exploited by any attacker.
- One integer overflow vulnerability can be exploited by a WINS replication partner.
An attacker may use these flaws to execute arbitrary code on the remote system with SYSTEM privileges.
Solution
Microsoft has released a set of patches for Windows 2000 and 2003 :
http://technet.microsoft.com/en-us/security/bulletin/MS09-039
Risk Factor
Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 35980
BID 35981
CVE CVE-2009-1923
CVE CVE-2009-1924
XREF OSVDB:56899
XREF OSVDB:56900
XREF MSFT:MS09-039
XREF CWE:189
Plugin Information:
12
Publication date: 2009/08/12, Modification date: 2014/07/11
Ports
tcp/42
54585 - MS11-035: Vulnerability in WINS Could Allow Remote Code Execution (2524426)
(uncredentialed check)
Synopsis
Arbitrary code can be executed on the remote host through Microsoft Windows Internet Name Service (WINS).
Description
The version of WINS (Windows Internet Name Service) installed on the remote Windows host is affected by a memory
corruption vulnerability due to a logic error when handling a socket send exception.
By sending specially crafted packets to the affected WINS system, a remote attacker can potentially exploit this issue
to execute arbitrary code as either SYSTEM on Windows 2003 or Local Service on Windows 2008 / 2008 R2.
Note that WINS is not installed by default on any of the affected operating systems, although Nessus has determined
it is on this host.
Note also that this plugin only checks for the vulnerability in Windows 2003.
See Also
http://www.zerodayinitiative.com/advisories/ZDI-11-167/
Solution
Microsoft has released a set of patches for Windows 2003, 2008, and 2008 R2 :
http://technet.microsoft.com/en-us/security/bulletin/ms11-035
Risk Factor
High
CVSS Base Score
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.3 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 47730
CVE CVE-2011-1248
XREF OSVDB:72234
XREF MSFT:MS11-035
Exploitable with
Core Impact (true)
Plugin Information:
Publication date: 2011/05/19, Modification date: 2014/07/11
Ports
tcp/42
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
13
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/42
Port 42/tcp was found to be open
14
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information:
Publication date: 2003/02/13, Modification date: 2014/11/05
Ports
tcp/53
53/udp
11002 - DNS Server Detection
Synopsis
A DNS server is listening on the remote host.
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP
addresses.
See Also
http://en.wikipedia.org/wiki/Domain_Name_System
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information:
Publication date: 2003/02/13, Modification date: 2014/11/05
Ports
udp/53
88/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/88
Port 88/tcp was found to be open
15
n/a
Risk Factor
None
Plugin Information:
Publication date: 2010/01/08, Modification date: 2015/09/24
Ports
tcp/88
110/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/110
Port 110/tcp was found to be open
16
The remote host is running a server that understands the Post Office Protocol (POP), used by email clients to retrieve
messages from a server, possibly across a network link.
See Also
http://en.wikipedia.org/wiki/Post_Office_Protocol
Solution
Disable this service if you do not use it.
Risk Factor
None
Plugin Information:
Publication date: 1999/10/12, Modification date: 2011/03/11
Ports
tcp/110
123/udp
10884 - Network Time Protocol (NTP) Server Detection
Synopsis
An NTP server with an insecure configuration is listening on the remote host.
Description
An NTP server with an insecure configuration is listening on port 123.
It provides information about its version, current date, current time, and it may also provide system information.
See Also
http://www.ntp.org
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2015/03/20, Modification date: 2015/06/12
Ports
udp/123
Version : unknown
135/tcp
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
17
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/135
18
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/135
Port 135/tcp was found to be open
137/udp
10150 - Windows NetBIOS / SMB Remote Host Information Disclosure
Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.
Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 1999/10/12, Modification date: 2016/02/26
Ports
udp/137
The following 8 NetBIOS names have been gathered :
The remote host has the following MAC address on its adapter :
08:00:27:96:77:ad
139/tcp
11011 - Microsoft Windows SMB Service Detection
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol,
used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
19
None
Plugin Information:
Publication date: 2002/06/05, Modification date: 2015/06/02
Ports
tcp/139
389/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/389
Port 389/tcp was found to be open
20
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2006/02/10, Modification date: 2016/01/05
Ports
tcp/389
25701 - LDAP Crafted Search Request Server Information Disclosure
Synopsis
It is possible to discover information about the remote LDAP server.
Description
By sending a search request with a filter set to 'objectClass=*', it is possible to extract information about the remote
LDAP server.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/07/12, Modification date: 2012/02/20
Ports
tcp/389
[+]-namingContexts:
| DC=Kumar,DC=local
| CN=Configuration,DC=Kumar,DC=local
| CN=Schema,CN=Configuration,DC=Kumar,DC=local
| DC=DomainDnsZones,DC=Kumar,DC=local
| DC=ForestDnsZones,DC=Kumar,DC=local
| DC=TAPI3Directory,DC=Kumar,DC=local
[+]-currentTime:
| 20160428080022.0Z
[+]-subschemaSubentry:
| CN=Aggregate,CN=Schema,CN=Configuration,DC=Kumar,DC=local
[+]-dsServiceName:
| CN=NTDS Settings,CN=KUMAR,CN=Servers,CN=Default-First-
Site,CN=Sites,CN=Configuration,DC=Kumar,DC=local
[+]-namingContexts:
| DC=Kumar,DC=local
| CN=Configuration,DC=Kumar,DC=local
| CN=Schema,CN=Configuration,DC=Kumar,DC=local
| DC=DomainDnsZones,DC=Kumar,DC=local
| DC=ForestDnsZones,DC=Kumar,DC=local
| DC=TAPI3Directory,DC=Kumar,DC=local
[+]-defaultNamingContext:
| DC=Kumar,DC=local
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=Kumar,DC=local
[+]-configurationNamingContext:
| CN=Configuration,DC=Kumar,DC=local
[+]-rootDomainNamingContext:
| DC=Kumar,DC=local
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
21
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
[+]-supportedLDAPVersion:
| 3
| 2
[+]-supportedLDAPPolicies:
| MaxPoolThreads
| MaxDatagramRecv
| MaxReceiveBuffer
| InitRecvTimeout
| MaxConnections
| MaxConnIdleTime
| MaxPageSize
| MaxQueryDuration
| MaxTempTableSize
| MaxResultSetSize
| MaxNotificationPerConn
[...]
445/tcp
35362 - MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687)
(uncredentialed check)
Synopsis
It is possible to crash the remote host due to a flaw in SMB.
Description
The remote host is affected by a memory corruption vulnerability in SMB that may allow an attacker to execute
arbitrary code or perform a denial of service against the remote host.
See Also
http://www.microsoft.com/technet/security/bulletin/ms09-001.mspx
Solution
Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.
Risk Factor
Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.8 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 31179
BID 33121
BID 33122
CVE CVE-2008-4834
CVE CVE-2008-4835
CVE CVE-2008-4114
22
XREF OSVDB:48153
XREF OSVDB:52691
XREF OSVDB:52692
XREF MSFT:MS09-001
XREF CWE:399
Exploitable with
Core Impact (true)Metasploit (true)
Plugin Information:
Publication date: 2009/01/13, Modification date: 2016/04/27
Ports
tcp/445
34477 - MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code
Execution (958644) (uncredentialed check)
Synopsis
The remote Windows host is affected by a remote code execution vulnerability.
Description
The remote Windows host is affected by a remote code execution vulnerability in the 'Server' service due to improper
handling of RPC requests. An unauthenticated, remote attacker can exploit this, via a specially crafted RPC request,
to execute arbitrary code with 'System'
privileges.
See Also
http://technet.microsoft.com/en-us/security/bulletin/ms08-067
Solution
Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.
Risk Factor
Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
8.7 (CVSS2#E:H/RL:OF/RC:C)
STIG Severity
I
References
BID 31874
CVE CVE-2008-4250
XREF OSVDB:49243
XREF MSFT:MS08-067
XREF CERT:827267
XREF IAVA:2008-A-0081
XREF EDB-ID:6824
XREF EDB-ID:7104
23
XREF EDB-ID:7132
XREF CWE:94
Exploitable with
CANVAS (true)Core Impact (true)Metasploit (true)
Plugin Information:
Publication date: 2008/10/23, Modification date: 2015/12/28
Ports
tcp/445
56210 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration Without
Credentials
Synopsis
It is possible to obtain the host SID for the remote host, without credentials.
Description
By emulating the call to LsaQueryInformationPolicy(), it was possible to obtain the host SID (Security Identifier),
without credentials.
The host SID can then be used to get the list of local users.
See Also
http://technet.microsoft.com/en-us/library/bb418944.aspx
Solution
You can prevent anonymous lookups of the host SID by setting the 'RestrictAnonymous' registry setting to an
appropriate value.
Refer to the 'See also' section for guidance.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
5.0 (CVSS2#E:H/RL:U/RC:C)
References
BID 959
CVE CVE-2000-1200
XREF OSVDB:715
Plugin Information:
Publication date: 2011/09/15, Modification date: 2014/04/11
Ports
tcp/445
1-5-21-1928287797-289972450-5230789
56211 - SMB Use Host SID to Enumerate Local Users Without Credentials
Synopsis
It is possible to enumerate local users, without credentials.
Description
Using the host security identifier (SID), it is possible to enumerate local users on the remote Windows system without
credentials.
Solution
24
n/a
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
5.0 (CVSS2#E:H/RL:U/RC:C)
References
BID 959
CVE CVE-2000-1200
XREF OSVDB:714
XREF OSVDB:715
Plugin Information:
Publication date: 2011/09/15, Modification date: 2015/11/18
Ports
tcp/445
http://support.microsoft.com/kb/q246261/
http://technet.microsoft.com/en-us/library/cc785969(WS.10).aspx
Solution
Apply the following registry changes per the referenced Technet advisories :
Set :
- HKLM\SYSTEM\CurrentControlSet\Control\LSA\RestrictAnonymous=1
- HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\restrictnullsessaccess=1
25
Remove BROWSER from :
- HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters\NullSessionPipes
Reboot once the registry changes are complete.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score
4.2 (CVSS2#E:U/RL:U/RC:ND)
References
BID 494
CVE CVE-1999-0519
CVE CVE-1999-0520
CVE CVE-2002-1117
XREF OSVDB:299
XREF OSVDB:8230
Plugin Information:
Publication date: 2007/10/04, Modification date: 2012/02/29
Ports
tcp/445
It was possible to bind to the \browser pipe
26
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/445
27
Type : Remote RPC service
Named pipe : \PIPE\INETINFO
Netbios name : \\KUMAR
Obj [...]
http://support.microsoft.com/kb/246261
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2000/05/09, Modification date: 2016/03/11
Ports
tcp/445
- NULL sessions are enabled on the remote host.
28
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/445
Port 445/tcp was found to be open
10398 - Microsoft Windows SMB LsaQueryInformationPolicy Function NULL Session Domain SID
Enumeration
Synopsis
It is possible to obtain the domain SID.
Description
By emulating the call to LsaQueryInformationPolicy() it was possible to obtain the domain SID (Security Identifier).
The domain SID can then be used to get the list of users of the domain
Solution
n/a
Risk Factor
None
References
BID 959
CVE CVE-2000-1200
XREF OSVDB:715
Plugin Information:
Publication date: 2000/05/09, Modification date: 2015/01/12
Ports
tcp/445
The remote domain SID value is :
1-5-21-1928287797-289972450-5230789
CVE CVE-2000-1200
XREF OSVDB:714
XREF OSVDB:715
29
Plugin Information:
Publication date: 2000/05/09, Modification date: 2015/11/18
Ports
tcp/445
KUMAR ( os : 5.2 )
26917 - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry
Synopsis
Nessus is not able to access the remote Windows Registry.
Description
It was not possible to connect to PIPE\winreg on the remote host.
If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the 'Remote
Registry Access'
service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials.
Solution
30
n/a
Risk Factor
None
Plugin Information:
Publication date: 2007/10/04, Modification date: 2011/03/27
Ports
tcp/445
Could not connect to the registry because:
Could not connect to \winreg
CVE CVE-2000-1200
XREF OSVDB:715
Plugin Information:
Publication date: 2002/02/13, Modification date: 2015/11/18
Ports
tcp/445
1-5-21-1928287797-289972450-5230789
31
XREF OSVDB:714
Plugin Information:
Publication date: 2002/02/13, Modification date: 2015/11/18
Ports
tcp/445
464/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/464
Port 464/tcp was found to be open
593/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
32
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/593
Port 593/tcp was found to be open
636/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/636
Port 636/tcp was found to be open
1026/tcp
90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock)
(uncredentialed check)
Synopsis
The remote Windows host is affected by an elevation of privilege vulnerability.
Description
The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account Manager (SAM)
and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level negotiation over
Remote Procedure Call (RPC) channels. A man-in-the-middle attacker able to intercept communications between a
client and a server hosting a SAM database can exploit this to force the authentication level to downgrade, allowing
the attacker to impersonate an authenticated user and access the SAM database.
33
See Also
https://technet.microsoft.com/library/security/MS16-047
http://badlock.org/
Solution
Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.
Risk Factor
Medium
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
STIG Severity
I
References
CVE CVE-2016-0128
XREF OSVDB:136339
XREF MSFT:MS16-047
XREF IAVA:2016-A-0093
Plugin Information:
Publication date: 2016/04/13, Modification date: 2016/04/17
Ports
tcp/1026
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1026
34
Type : Remote RPC service
TCP Port : 1026
IP : 192.168.0.122
1027/tcp
11219 - Nessus SYN scanner
35
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/1027
Port 1027/tcp was found to be open
http://support.microsoft.com/support/kb/articles/Q282/2/61.ASP
Solution
If you do not use this service, disable it with DCOMCNFG.
Otherwise, limit access to this port.
Risk Factor
None
Plugin Information:
Publication date: 2001/09/14, Modification date: 2011/03/21
Ports
36
tcp/1027
Server banner :
ncacn_http/1.0
1041/tcp
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1041
1042/tcp
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1042
37
TCP Port : 1042
IP : 192.168.0.122
1043/tcp
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1043
38
Type : Remote RPC service
TCP Port : 1043
IP : 192.168.0.122
1048/tcp
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1048
1053/tcp
10736 - DCE Services Enumeration
Synopsis
39
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1053
40
Port 1053/tcp was found to be open
1059/tcp
10736 - DCE Services Enumeration
Synopsis
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1059
1063/tcp
10736 - DCE Services Enumeration
Synopsis
41
A DCE/RPC service is running on the remote host.
Description
By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate the
Distributed Computing Environment (DCE) services running on the remote port. Using this information it is possible to
connect and bind to each service by sending an RPC request to the remote port/pipe.
Solution
n/a
Risk Factor
None
Plugin Information:
Publication date: 2001/08/26, Modification date: 2014/05/12
Ports
tcp/1063
3268/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
42
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/3268
Port 3268/tcp was found to be open
43
| CN=Aggregate,CN=Schema,CN=Configuration,DC=Kumar,DC=local
[+]-dsServiceName:
| CN=NTDS Settings,CN=KUMAR,CN=Servers,CN=Default-First-
Site,CN=Sites,CN=Configuration,DC=Kumar,DC=local
[+]-namingContexts:
| DC=Kumar,DC=local
| CN=Configuration,DC=Kumar,DC=local
| CN=Schema,CN=Configuration,DC=Kumar,DC=local
| DC=DomainDnsZones,DC=Kumar,DC=local
| DC=ForestDnsZones,DC=Kumar,DC=local
| DC=TAPI3Directory,DC=Kumar,DC=local
[+]-defaultNamingContext:
| DC=Kumar,DC=local
[+]-schemaNamingContext:
| CN=Schema,CN=Configuration,DC=Kumar,DC=local
[+]-configurationNamingContext:
| CN=Configuration,DC=Kumar,DC=local
[+]-rootDomainNamingContext:
| DC=Kumar,DC=local
[+]-supportedControl:
| 1.2.840.113556.1.4.319
| 1.2.840.113556.1.4.801
| 1.2.840.113556.1.4.473
| 1.2.840.113556.1.4.528
| 1.2.840.113556.1.4.417
| 1.2.840.113556.1.4.619
| 1.2.840.113556.1.4.841
| 1.2.840.113556.1.4.529
| 1.2.840.113556.1.4.805
| 1.2.840.113556.1.4.521
| 1.2.840.113556.1.4.970
| 1.2.840.113556.1.4.1338
| 1.2.840.113556.1.4.474
| 1.2.840.113556.1.4.1339
| 1.2.840.113556.1.4.1340
| 1.2.840.113556.1.4.1413
| 2.16.840.1.113730.3.4.9
| 2.16.840.1.113730.3.4.10
| 1.2.840.113556.1.4.1504
| 1.2.840.113556.1.4.1852
| 1.2.840.113556.1.4.802
| 1.2.840.113556.1.4.1907
| 1.2.840.113556.1.4.1948
[+]-supportedLDAPVersion:
| 3
| 2
[+]-supportedLDAPPolicies:
| MaxPoolThreads
| MaxDatagramRecv
| MaxReceiveBuffer
| InitRecvTimeout
| MaxConnections
| MaxConnIdleTime
| MaxPageSize
| MaxQueryDuration
| MaxTempTableSize
| MaxResultSetSize
| MaxNotificationPerConn
[...]
3269/tcp
11219 - Nessus SYN scanner
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.
Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause
problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
44
None
Plugin Information:
Publication date: 2009/02/04, Modification date: 2014/01/23
Ports
tcp/3269
Port 3269/tcp was found to be open
3389/tcp
58435 - MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387)
(uncredentialed check)
Synopsis
The remote Windows host could allow arbitrary code execution.
Description
An arbitrary remote code vulnerability exists in the implementation of the Remote Desktop Protocol (RDP) on the
remote Windows host. The vulnerability is due to the way that RDP accesses an object in memory that has been
improperly initialized or has been deleted.
If RDP has been enabled on the affected system, an unauthenticated, remote attacker could leverage this vulnerability
to cause the system to execute arbitrary code by sending a sequence of specially crafted RDP packets to it.
This plugin also checks for a denial of service vulnerability in Microsoft Terminal Server.
Note that this script does not detect the vulnerability if the 'Allow connections only from computers running Remote
Desktop with Network Level Authentication' setting is enabled or the security layer is set to 'SSL (TLS 1.0)' on the
remote host.
See Also
http://technet.microsoft.com/en-us/security/bulletin/ms12-020
Solution
Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.
Note that an extended support contract with Microsoft is required to obtain the patch for this vulnerability for Windows
2000.
Risk Factor
High
CVSS Base Score
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
7.3 (CVSS2#E:POC/RL:OF/RC:C)
STIG Severity
45
I
References
BID 52353
BID 52354
CVE CVE-2012-0002
CVE CVE-2012-0152
XREF OSVDB:80000
XREF OSVDB:80004
XREF EDB-ID:18606
XREF MSFT:MS12-020
XREF IAVA:2012-A-0039
Exploitable with
CANVAS (true)Core Impact (true)Metasploit (true)
Plugin Information:
Publication date: 2012/03/22, Modification date: 2016/04/27
Ports
tcp/3389
57690 - Terminal Services Encryption Level is Medium or Low
Synopsis
The remote host is using weak cryptography.
Description
The remote Terminal Services service is not configured to use strong cryptography.
Using weak cryptography with this service may allow an attacker to eavesdrop on the communications more easily
and obtain screenshots and/or keystrokes.
Solution
Change RDP encryption level to one of :
3. High
4. FIPS Compliant
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
Plugin Information:
Publication date: 2012/01/25, Modification date: 2016/03/02
Ports
tcp/3389
2. Medium
46
The remote version of the Remote Desktop Protocol Server (Terminal Service) is vulnerable to a man-in-the-middle
(MiTM) attack. The RDP client makes no effort to validate the identity of the server when setting up encryption. An
attacker with the ability to intercept traffic from the RDP server can establish encryption with the client and server
without being detected. A MiTM attack of this nature would allow the attacker to obtain any sensitive information
transmitted, including authentication credentials.
This flaw exists because the RDP server stores a hard-coded RSA private key in the mstlsapi.dll library. Any local
user with access to this file (on any Windows system) can retrieve the key and use it for this attack.
See Also
http://www.oxid.it/downloads/rdp-gbu.pdf
http://www.nessus.org/u?e2628096
http://technet.microsoft.com/en-us/library/cc782610.aspx
Solution
- Force the use of SSL as a transport layer for this service if supported, or/and
- Select the 'Allow connections only from computers running Remote Desktop with Network Level Authentication'
setting if it is available.
Risk Factor
Medium
CVSS Base Score
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score
4.6 (CVSS2#E:F/RL:W/RC:ND)
References
BID 13818
CVE CVE-2005-1794
XREF OSVDB:17131
Plugin Information:
Publication date: 2005/06/01, Modification date: 2014/03/04
Ports
tcp/3389
30218 - Terminal Services Encryption Level is not FIPS-140 Compliant
Synopsis
The remote host is not FIPS-140 compliant.
Description
The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant.
Solution
Change RDP encryption level to :
4. FIPS Compliant
Risk Factor
Low
CVSS Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information:
Publication date: 2008/02/11, Modification date: 2016/03/02
Ports
tcp/3389
47
2. Medium (Client Compatible)
48
Ports
tcp/3389
It was possible to gather the following screenshot of the remote login screen.
49
Remediations
Suggested Remediations
Taking the following actions across 1 hosts would resolve 8% of the vulnerabilities on the network:
MS10-024: Vulnerabilities in Microsoft Exchange and Windows SMTP Service Could Allow Denial of 2 1
Service (981832) (uncredentialed check):
MS12-020: Vulnerabilities in Remote Desktop Could Allow Remote Code Execution (2671387) 0 1
(uncredentialed check):
51