X-Scan 检测报告
------------------
检测结果
- 存活主机 : 1
- 漏洞数量 : 1
- 警告数量 : 2
- 提示数量 : 6
主机列表
www.****.com (发现安全漏洞)
. OS: Unknown OS; PORT/TCP:
详细资料
+ www.****.com :
. 开放端口列表 :
o ftp (21/tcp) (发现安全提示)
o pop3 (110/tcp) (发现安全漏洞)
o smtp (25/tcp) (发现安全警告)
o imap (143/tcp) (发现安全提示)
o netbios-ns (137/udp) (发现安全警告)
. 端口"ftp (21/tcp)"发现安全提示 :
A FTP server is running on this port.
Here is its banner :
220 Serv-U FTP Server v6.0 for WinSock ready...
NESSUS_ID : 10330
. 端口"ftp (21/tcp)"发现安全提示 :
通过登陆目标服务器并经过缓冲器接收可查出FTP服务的类型和版本。这些注册过的标识信息将给予潜在的攻击者们关于他们要攻击的系统的额外信息。版本和类型会在可能的地方被泄露。
解决方案:将这些注册过的标识信息转变为普通类别的信息。。
风险等级:低
___________________________________________________________________
Remote FTP server banner :
220 Serv-U FTP Server v6.0 for WinSock ready...
NESSUS_ID : 10092
. 端口"pop3 (110/tcp)"发现安全漏洞 :
The remote POP3 server might be vulnerable to a buffer overflow
bug when it is issued at least one of these commands, with a too long
argument :
auth
user
pass
If confirmed, this problem might allow an attacker to execute
arbitrary code on the remote system, thus giving him an interactive
session on this host.
Solution : If you do not use POP3, disable this service in /etc/inetd.conf
and restart the inetd process. Otherwise, upgrade to a newer version.
See also : http://online.securityfocus.com/archive/1/27197
Risk factor : High
CVE_ID : CAN-2002-0799, CAN-1999-0822
BUGTRAQ_ID : 789, 790, 830, 894, 942, 1965, 2781, 2811, 4055, 4295, 4614
NESSUS_ID : 10184
. 端口"pop3 (110/tcp)"发现安全提示 :
A pop3 server is running on this port
NESSUS_ID : 10330
. 端口"smtp (25/tcp)"发现安全警告 :
远程邮件服务器回应了EXPN或VRFY命令。
EXPN命令能被用于查找邮件别名的递送地址,甚至能查到收件人的全名。
VRFY命名能被用来测试帐号的有效性。
由于这些命令可显示过多的信息,因此邮件服务器上应该禁用这些命令。
解决方案: 如果你使用的是Sendmail, 请添加:
O PrivacyOptions=goaway
到配置文件 /etc/sendmail.cf.
风险等级 : 低
___________________________________________________________________
The remote SMTP server answers to the EXPN and/or VRFY commands.
The EXPN command can be used to find the delivery address of mail aliases,
or
even the full name of the recipients, and the VRFY command may be used to
check the validity of an account.
Your mailer should not allow remote users to use any of these commands,
because it gives them too much information.
Solution : if you are using Sendmail, add the option :
O PrivacyOptions=goaway
in /etc/sendmail.cf.
Risk factor : Low
CVE_ID : CAN-1999-0531
NESSUS_ID : 10249
. 端口"smtp (25/tcp)"发现安全提示 :
A SMTP server is running on this port
Here is its banner :
220 gwgz.com ESMTP MDaemon 7.2.1
Sat, 05 Feb 2005 22:34:37 +0800
NESSUS_ID : 10330
. 端口"smtp (25/tcp)"发现安全提示 :
通过连接服务器并处理缓冲区里接收到的数据,当前脚本检测了SMTP
服务端类型和版本。
该信息向攻击者提供了更多系统信息。应该适当隐藏服务程序的版本和类型。
解决方案: 修改登陆banner不包含相关标识信息
风险等级: 低
___________________________________________________________________
Remote SMTP server banner :
220 KAV6 Smtp Proxy Server Ready
NESSUS_ID : 10263
. 端口"imap (143/tcp)"发现安全提示 :
An IMAP server is running on this port
NESSUS_ID : 10330
. 端口"netbios-ns (137/udp)"发现安全警告 :
如果NetBIOS端口(UDP:137)已经打开,
一个远程攻击者可以利用这个漏洞获得主机
的敏感信息,比如机器名,工作组/域名,
当前登陆用户名等。
解决方法:阻止这个端口的外部通信。
风险等级:中
___________________________________________________________________
The following 6 NetBIOS names have been gathered :
VIP-5J2Y5XQE4FO = This is the computer name registered for workstation
services by a WINS client.
VIP-5J2Y5XQE4FO = Computer name
WORKGROUP = Workgroup / Domain name
WORKGROUP = Workgroup / Domain name (part of the Browser elections)
INet~Services = Workgroup / Domain name (Domain Controller)
IS~P-5J2Y5XQE4F
If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.
Risk factor : Medium
CVE_ID : CAN-1999-0621
NESSUS_ID : 10150
------------------------------------------------------
本报表由网络安全漏洞扫描器"X-Scan"生成.
|