Security Issues and Fixes: 10.168.1.2 |
Type |
Port |
Issue and Fix |
Informational |
smtp (25/tcp) |
An SMTP server is running on this port
Here is its banner :
220 winserver.recyclenorth.org Microsoft ESMTP MAIL Service, Version: 5.0.2195.6713 ready at Fri, 14 Nov 2008 15:41:14 -0500
Nessus ID : 10330 |
Informational |
smtp (25/tcp) |
A SMTP server is running on this port
Nessus ID : 14773 |
Informational |
smtp (25/tcp) |
Remote SMTP server banner :
220 winserver.recyclenorth.org Microsoft ESMTP MAIL Service, Version: 5.0.2195.6713 ready at Fri, 14 Nov 2008 15:42:00 -0500
This is probably: Microsoft Exchange version 5.0.2195.6713 ready at Fri, 14 Nov 2008 15:42:00 -0500
Nessus ID : 10263 |
Warning |
ms-wbt-server (3389/tcp) |
The Terminal Services are enabled on the remote host.
Terminal Services allow a Windows user to remotely obtain
a graphical login (and therefore act as a local user on the
remote host).
If an attacker gains a valid login and password, he may
be able to use this service to gain further access
on the remote host. An attacker may also use this service
to mount a dictionnary attack against the remote host to try
to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable
to Man-in-the-middle attacks, making it easy for attackers to
steal the credentials of legitimates users by impersonating the
Windows server.
Solution : Disable the Terminal Services if you do not use them, and
do not allow this service to run across the internet
Risk factor : Medium
CVE : CVE-2001-0540
BID : 3099, 7258
Nessus ID : 10940 |
Informational |
brvread (1054/tcp) |
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Here is the list of DCE services running on this port:
UUID: f5cc59b4-4264-101a-8c59-08002b2f8426, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1054]
Annotation: NtFrs Service
UUID: d049b186-814f-11d1-9a3c-00c04fc9b232, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1054]
Annotation: NtFrs API
UUID: a00c021c-2be2-11d2-b678-0000f87a8f8e, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1054]
Annotation: PERFMON SERVICE
Solution : filter incoming traffic to this port.
Risk factor : Low
Nessus ID : 10736 |
Informational |
chargen (19/tcp) |
Chargen is running on this port
Nessus ID : 10330 |
Informational |
neod2 (1048/tcp) |
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Here is the list of DCE services running on this port:
UUID: 1ff70682-0a51-30e8-076d-740be8cee98b, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1048]
Named pipe : atsvc
Win32 service or process : mstask.exe
Description : Scheduler service
UUID: 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1048]
Solution : filter incoming traffic to this port.
Risk factor : Low
Nessus ID : 10736 |
Warning |
daytime (13/tcp) |
The remote host is running a 'daytime' service. This service
is designed to give the local time of the day of this host
to whoever connects to this port.
The date format issued by this service may sometimes help an attacker
to guess the operating system type of this host, or to set up
timed authentication attacks against the remote host.
In addition to that, the UDP version of daytime is running, an attacker
may link it to the echo port of a third party host using spoofing, thus
creating a possible denial of service condition between this host and
a third party.
Solution :
- Under Unix systems, comment out the 'daytime' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpDaytime
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpDaytime
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor : Low
CVE : CVE-1999-0103
Nessus ID : 10052 |
Warning |
echo (7/tcp) |
The remote host is running the 'echo' service. This service
echoes any data which is sent to it.
This service is unused these days, so it is strongly advised that
you disable it, as it may be used by attackers to set up denial of
services attacks against this host.
Solution :
- Under Unix systems, comment out the 'echo' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry key to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpEcho
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpEcho
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor : Low
CVE : CVE-1999-0103, CAN-1999-0635
Nessus ID : 10061 |
Informational |
echo (7/tcp) |
An echo server is running on this port
Nessus ID : 10330 |
Vulnerability |
epmap (135/tcp) |
The remote host is running a version of Windows which has a flaw in
its RPC interface which may allow an attacker to execute arbitrary code
and gain SYSTEM privileges. There is at least one Worm which is
currently exploiting this vulnerability. Namely, the MsBlaster worm.
Solution: see http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx
Risk factor : High
CVE : CAN-2003-0352
BID : 8205
Other references : IAVA:2003-A-0011
Nessus ID : 11808 |
Warning |
epmap (135/tcp) |
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Solution : filter incoming traffic to this port.
Risk factor : Low
Nessus ID : 10736 |
Informational |
unknown (9189/tcp) |
An unknown server is running on this port.
If you know what it is, please send this banner to the Nessus team:
0x00: 0A 5B 72 6F 6F 74 2E 67 6C 6F 62 61 6C 73 2E 64 .[root.globals.d
0x10: 65 76 69 63 65 46 61 63 74 6F 72 79 2E 64 65 76 eviceFactory.dev
0x20: 69 63 65 73 2E 5D ices.]
Nessus ID : 11154 |
Warning |
qotd (17/tcp) |
Synopsis :
The quote service (qotd) is running on this host.
Description :
A server listens for TCP connections on TCP port 17. Once a connection
is established a short message is sent out the connection (and any
data received is thrown away). The service closes the connection
after sending the quote.
Another quote of the day service is defined as a datagram based
application on UDP. A server listens for UDP datagrams on UDP port 17.
When a datagram is received, an answering datagram is sent containing
a quote (the data in the received datagram is ignored).
An easy attack is 'pingpong' which IP spoofs a packet between two machines
running qotd. This will cause them to spew characters at each other,
slowing the machines down and saturating the network.
Solution :
- Under Unix systems, comment out the 'qotd' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpQotd
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpQotd
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor :
None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)
CVE : CVE-1999-0103
Nessus ID : 10198 |
Informational |
qotd (17/tcp) |
qotd (Quote of the Day) seems to be running on this port
Nessus ID : 11153 |
Informational |
fastechnologlm (1074/tcp) |
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Here is the list of DCE services running on this port:
UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1074]
UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1074]
UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1074]
UUID: 906b0ce0-c70b-1067-b317-00dd010662da, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1074]
Solution : filter incoming traffic to this port.
Risk factor : Low
Nessus ID : 10736 |
Informational |
callbook (2000/tcp) |
An unknown service runs on this port.
It is sometimes opened by this/these Trojan horse(s):
Der Sp her / Der Spaeher
Insane Network
Last 2000
Remote Explorer 2000
Senna Spy Trojan Generator
Unless you know for sure what is behind it, you'd better
check your system
*** Anyway, don't panic, Nessus only found an open port. It may
*** have been dynamically allocated to some service (RPC...)
Solution: if a trojan horse is running, run a good antivirus scanner
Risk factor : Low
Nessus ID : 11157 |
Informational |
unknown (9180/tcp) |
A web server is running on this port
Nessus ID : 10330 |
Informational |
unknown (9180/tcp) |
The remote web server type is :
Tomcat Web Server/3.3a Final ( JSP 1.1; Servlet 2.2 )
Nessus ID : 10107 |
Informational |
netbios-ssn (139/tcp) |
An SMB server is running on this port
Nessus ID : 11011 |
Warning |
http (80/tcp) |
The remote web server seems to have its default welcome page set.
It probably means that this server is not used at all.
Solution : Disable this service, as you do not use it
Risk factor : Low
Nessus ID : 11422 |
Informational |
http (80/tcp) |
A web server is running on this port
Nessus ID : 10330 |
Informational |
http (80/tcp) |
The remote web server type is :
Microsoft-IIS/5.0
Nessus ID : 10107 |
Warning |
microsoft-ds (445/tcp) |
The domain SID can be obtained remotely. Its value is :
RECYCLENORTH : 5-21-507921405-1644491937-682003330
An attacker can use it to obtain the list of the local users of this host
Solution : filter the ports 137 to 139 and 445
Risk factor : Low
CVE : CVE-2000-1200
BID : 959
Nessus ID : 10398 |
Warning |
microsoft-ds (445/tcp) |
The domain SID could be used to enumerate the names of the users
of this domain.
(we only enumerated users name whose ID is between 1000 and 1200
for performance reasons)
This gives extra knowledge to an attacker, which
is not a good thing :
- Administrator account name : Administrator (id 500)
- Guest account name : Guest (id 501)
- TsInternetUser (id 1000)
- NetShowServices (id 1001)
- NetShow Administrators (id 1002)
- IUSR_WINSERVER (id 1003)
- IWAM_WINSERVER (id 1004)
- WINSERVER$ (id 1005)
- DnsAdmins (id 1106)
- DnsUpdateProxy (id 1107)
- kate hanson (id 1112)
- bjohnson (id 1115)
- Tom (id 1117)
- staff (id 1118)
- ADMIN006$ (id 1121)
- ADMIN003$ (id 1123)
- ADMIN002$ (id 1124)
- timeclock (id 1125)
- ISMANAGER$ (id 1137)
- appliance (id 1140)
- STORECLOCK$ (id 1142)
- TIMECLOCK1$ (id 1149)
- RN Administrator (id 1155)
- clerk1 (id 1161)
- ASSTSTORE$ (id 1164)
- pos (id 1165)
- RNBUR$ (id 1170)
- ASSISTANTSALES$ (id 1175)
- assistantsales (id 1176)
- REGISTER2$ (id 1179)
- clerk2 (id 1180)
- assistantoffice (id 1181)
- DB_Source_Access (id 1182)
- DB_Source_Admin (id 1183)
Risk factor : Medium
Solution : filter incoming connections this port
CVE : CVE-2000-1200
BID : 959
Nessus ID : 10399 |
Warning |
microsoft-ds (445/tcp) |
The following accounts have never logged in :
Guest
Unused accounts are very helpful to hacker
Solution : suppress these accounts
Risk factor : Medium
Nessus ID : 10899 |
Warning |
microsoft-ds (445/tcp) |
The following accounts have passwords which never expire :
Administrator
Guest
Password should have a limited lifetime
Solution : disable password non-expiry
Risk factor : Medium
Nessus ID : 10900 |
Warning |
microsoft-ds (445/tcp) |
The host Security Identifier (SID) can be obtained remotely. Its value is :
WINSERVER : 5-21-1309028720-26572006--1316769466
An attacker can use it to obtain the list of the local users of this host
Solution : filter the ports 137-139 and 445
Risk factor : Low
CVE : CVE-2000-1200
BID : 959
Nessus ID : 10859 |
Warning |
microsoft-ds (445/tcp) |
The host SID could be used to enumerate the names of the local users
of this host.
(we only enumerated users name whose ID is between 1000 and 1200
for performance reasons)
This gives extra knowledge to an attacker, which
is not a good thing :
- Administrator account name : Administrator (id 500)
- Guest account name : Guest (id 501)
- DHCP Users (id 1000)
- DHCP Administrators (id 1001)
- IWAM_WINSERVER (id 1002)
- IUSR_WINSERVER (id 1003)
- bhsiang (id 1004)
- ASPNET (id 1005)
Risk factor : Medium
Solution : filter incoming connections this port
CVE : CVE-2000-1200
BID : 959
Nessus ID : 10860 |
Warning |
microsoft-ds (445/tcp) |
The following local accounts have passwords which never expire :
Administrator
Guest
IWAM_WINSERVER
IUSR_WINSERVER
bhsiang
ASPNET
Password should have a limited lifetime
Solution : disable password non-expiry
Risk factor : Medium
Nessus ID : 10916 |
Warning |
microsoft-ds (445/tcp) |
The following local accounts have never logged in :
Guest
bhsiang
Unused accounts are very helpful to hacker
Solution : suppress these accounts
Risk factor : Medium
Nessus ID : 10915 |
Warning |
microsoft-ds (445/tcp) |
The following local accounts have never changed their password :
IWAM_WINSERVER
IUSR_WINSERVER
bhsiang
ASPNET
To minimize the risk of break-in, users should
change their password regularly
Nessus ID : 10914 |
Informational |
microsoft-ds (445/tcp) |
A CIFS server is running on this port
Nessus ID : 11011 |
Informational |
microsoft-ds (445/tcp) |
It was possible to log into the remote host using a NULL session.
The concept of a NULL session is to provide a null username and
a null password, which grants the user the 'guest' access
To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and
Q246261 (Windows 2000).
Note that this won't completely disable null sessions, but will
prevent them from connecting to IPC$
Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html
All the smb tests will be done as ''/'' in domain RECYCLENORTH
CVE : CAN-1999-0504, CAN-1999-0506, CVE-2000-0222, CAN-1999-0505, CAN-2002-1117
BID : 494, 990, 11199
Nessus ID : 10394 |
Informational |
microsoft-ds (445/tcp) |
The following accounts are disabled :
Guest
To minimize the risk of break-in, permanently disabled accounts
should be deleted
Risk factor : Low
Nessus ID : 10897 |
Informational |
microsoft-ds (445/tcp) |
The following local accounts are disabled :
Guest
ASPNET
To minimize the risk of break-in, permanently disabled accounts
should be deleted
Risk factor : Low
Nessus ID : 10913 |
Informational |
rdrmshc (1075/tcp) |
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Here is the list of DCE services running on this port:
UUID: 82ad4280-036b-11cf-972c-00aa006887b0, version 2
Endpoint: ncacn_ip_tcp:10.168.1.2[1075]
UUID: 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3
Endpoint: ncacn_ip_tcp:10.168.1.2[1075]
UUID: bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1
Endpoint: ncacn_ip_tcp:10.168.1.2[1075]
Solution : filter incoming traffic to this port.
Risk factor : Low
Nessus ID : 10736 |
Warning |
discard (9/tcp) |
The remote host is running a 'discard' service. This service
typically sets up a listening socket and will ignore all the
data which it receives.
This service is unused these days, so it is advised that you
disable it.
Solution :
- Under Unix systems, comment out the 'discard' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry key to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpDiscard
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor : Low
CVE : CVE-1999-0636
Nessus ID : 11367 |
Informational |
general/udp |
For your information, here is the traceroute to 10.168.1.2 :
10.168.1.206
10.168.1.2
Nessus ID : 10287 |
Vulnerability |
general/icmp |
The remote host is vulnerable to an 'Etherleak' -
the remote ethernet driver seems to leak bits of the
content of the memory of the remote operating system.
Note that an attacker may take advantage of this flaw
only when its target is on the same physical subnet.
See also : http://www.atstake.com/research/advisories/2003/a010603-1.txt
Solution : Contact your vendor for a fix
Risk factor : High
CVE : CAN-2003-0001
BID : 6535
Nessus ID : 11197 |
Warning |
general/icmp |
The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.
This may help him to defeat all your time based authentication protocols.
Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).
Risk factor : Low
CVE : CAN-1999-0524
Nessus ID : 10114 |
Vulnerability |
snmp (161/udp) |
SNMP Agent responded as expected with community name: public
CVE : CAN-1999-0517, CAN-1999-0186, CAN-1999-0254, CAN-1999-0516
BID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986
Other references : IAVA:2001-B-0001
Nessus ID : 10264 |
Warning |
snmp (161/udp) |
It was possible to obtain the list of SMB users of the
remote host via SNMP :
. Guest
. ASPNET
. bhsiang
. Administrator
. IUSR_WINSERVER
. IWAM_WINSERVER
An attacker may use this information to set up brute force
attacks or find an unused account.
Solution : disable the SNMP service on the remote host if you do not
use it, or filter incoming UDP packets going to this port
Risk factor : Medium
Nessus ID : 10546 |
Warning |
snmp (161/udp) |
It was possible to obtain the list of Lanman shares of the
remote host via SNMP :
. ED
An attacker may use this information to gain more knowledge about
the target host.
Solution : disable the SNMP service on the remote host if you do not
use it, or filter incoming UDP packets going to this port
Risk factor : Low
CVE : CAN-1999-0499
Nessus ID : 10548 |
Warning |
snmp (161/udp) |
It was possible to obtain the list of Lanman services of the
remote host via SNMP :
. Server
. Diskeeper
. Event Log
. Messenger
. Net Logon
. Telephony
. DNS Client
. VNC Server
. DHCP Client
. Workstation
. SNMP Service
. Windows Time
. LexBce Server
. Plug and Play
. Print Spooler
. RunAs Service
. Task Scheduler
. Automatic Updates
. COM+ Event System
. IIS Admin Service
. MarkVision Server
. Protected Storage
. Removable Storage
. Symantec SPBBCSvc
. Terminal Services
. IPSEC Policy Agent
. Symantec AntiVirus
. BitDefender Starter
. Network Connections
. Logical Disk Manager
. MarkVision Web Server
. Simple TCP/IP Services
. Symantec Event Manager
. Distributed File System
. License Logging Service
. Remote Registry Service
. File Replication Service
. Security Accounts Manager
. Symantec Settings Manager
. System Event Notification
. Remote Procedure Call (RPC)
. TCP/IP NetBIOS Helper Service
. NT LM Security Support Provider
. Distributed Link Tracking Client
. Remote Access Connection Manager
. World Wide Web Publishing Service
. Windows Management Instrumentation
. Distributed Transaction Coordinator
. Simple Mail Transport Protocol (SMTP)
. Symantec AntiVirus Definition Watcher
. Windows Management Instrumentation Driver Extensions
An attacker may use this information to gain more knowledge about
the target host.
Solution : disable the SNMP service on the remote host if you do not
use it, or filter incoming UDP packets going to this port
Risk factor : Low
Nessus ID : 10547 |
Warning |
snmp (161/udp) |
It was possible to obtain the list of network interfaces of the
remote host via SNMP :
. MS TCP Loopback interface
. AMD PCNET Family Ethernet Adapter
An attacker may use this information to gain more knowledge about
the target host.
Solution : disable the SNMP service on the remote host if you do not
use it, or filter incoming UDP packets going to this port
Risk factor : Low
Nessus ID : 10551 |
Informational |
snmp (161/udp) |
Using SNMP, we could determine that the remote operating system is :
Hardware: x86 Family 6 Model 8 Stepping 6 AT/AT COMPATIBLE - Software: Windows 2000 Version 5.0 (Build 2195 Uniprocessor Free)
Nessus ID : 10800 |
Vulnerability |
general/tcp |
You are running a version of Nessus which is not configured to receive
a full plugin feed. As a result, the security audit of the remote host produced
incomplete results.
To obtain a complete plugin feed, you need to register your Nessus scanner
at http://www.nessus.org/register/ then run nessus-update-plugins to get
the full list of Nessus plugins.
Nessus ID : 9999 |
Warning |
general/tcp |
The remote host accepts loose source routed IP packets.
The feature was designed for testing purpose.
An attacker may use it to circumvent poorly designed IP filtering
and exploit another flaw. However, it is not dangerous by itself.
Solution : drop source routed packets on this host or on other ingress
routers or firewalls.
Risk factor : Low
Nessus ID : 11834 |
Informational |
general/tcp |
Information about this scan :
Nessus version : 2.2.10
Plugin feed version : 200704181215
Type of plugin feed : GPL only
Scanner IP : 10.168.1.206
Port scanner(s) : nessus_tcp_scanner
Port range : 1-15000
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 20
Max checks : 4
Scan duration : unknown (ping_host.nasl not launched?)
Nessus ID : 19506 |
Warning |
netbios-ns (137/udp) |
The following 7 NetBIOS names have been gathered :
WINSERVER
RECYCLENORTH = Workgroup / Domain name
WINSERVER = This is the current logged in user or registered workstation name.
WINSERVER = This is the computer name
INet~Services = Workgroup / Domain name (Domain Controller)
IS~WINSERVER
ADMINISTRATOR = This is the current logged in user or registered workstation name.
The remote host has the following MAC address on its adapter :
00:02:55:4c:29:8f
If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.
Risk factor : Medium
CVE : CAN-1999-0621
Nessus ID : 10150 |
Informational |
ansoft-lm-2 (1084/udp) |
Distributed Computing Environment (DCE) services running on the remote host
can be enumerated by connecting on port 135 and doing the appropriate queries.
An attacker may use this fact to gain more knowledge
about the remote host.
Here is the list of DCE services running on this port:
UUID: bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1
Endpoint: ncadg_ip_udp:10.168.1.2[1084]
Solution : filter incoming traffic to this port.
Risk factor : Low
Nessus ID : 10736 |
Warning |
daytime (13/udp) |
The remote host is running a 'daytime' service. This service
is designed to give the local time of the day of this host
to whoever connects to this port.
The date format issued by this service may sometimes help an attacker
to guess the operating system type of this host, or to set up
timed authentication attacks against the remote host.
In addition to that, the UDP version of daytime is running, an attacker
may link it to the echo port of a third party host using spoofing, thus
creating a possible denial of service condition between this host and
a third party.
Solution :
- Under Unix systems, comment out the 'daytime' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpDaytime
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpDaytime
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor : Low
CVE : CVE-1999-0103
Nessus ID : 10052 |
Warning |
chargen (19/udp) |
Synopsis :
The remote host is running a 'chargen' service.
Description :
When contacted, chargen responds with some random characters (something
like all the characters in the alphabet in a row). When contacted via UDP, it
will respond with a single UDP packet. When contacted via TCP, it will
continue spewing characters until the client closes the connection.
The purpose of this service was to mostly to test the TCP/IP protocol
by itself, to make sure that all the packets were arriving at their
destination unaltered. It is unused these days, so it is suggested
you disable it, as an attacker may use it to set up an attack against
this host, or against a third party host using this host as a relay.
An easy attack is 'ping-pong' in which an attacker spoofs a packet between
two machines running chargen. This will cause them to spew characters at
each other, slowing the machines down and saturating the network.
Solution :
- Under Unix systems, comment out the 'chargen' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpChargen
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpChargen
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:N/A:P/I:N/B:N)
CVE : CVE-1999-0103
Nessus ID : 10043 |
Warning |
qotd (17/udp) |
Synopsis :
The quote service (qotd) is running on this host.
Description :
A server listens for TCP connections on TCP port 17. Once a connection
is established a short message is sent out the connection (and any
data received is thrown away). The service closes the connection
after sending the quote.
Another quote of the day service is defined as a datagram based
application on UDP. A server listens for UDP datagrams on UDP port 17.
When a datagram is received, an answering datagram is sent containing
a quote (the data in the received datagram is ignored).
An easy attack is 'pingpong' which IP spoofs a packet between two machines
running qotd. This will cause them to spew characters at each other,
slowing the machines down and saturating the network.
Solution :
- Under Unix systems, comment out the 'qotd' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpQotd
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpQotd
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor :
None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)
CVE : CVE-1999-0103
Nessus ID : 10198 |
Warning |
echo (7/udp) |
The remote host is running the 'echo' service. This service
echoes any data which is sent to it.
This service is unused these days, so it is strongly advised that
you disable it, as it may be used by attackers to set up denial of
services attacks against this host.
Solution :
- Under Unix systems, comment out the 'echo' line in /etc/inetd.conf
and restart the inetd process
- Under Windows systems, set the following registry key to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpEcho
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpEcho
Then launch cmd.exe and type :
net stop simptcp
net start simptcp
To restart the service.
Risk factor : Low
CVE : CVE-1999-0103, CAN-1999-0635
Nessus ID : 10061 |