List of hosts Medium Severity problem(s) found [^] Back 156.111.5.207 156.111.5.207 Scan Time Start time : Wed Oct 6 21:49:25 2010 End time : Wed Oct 6 21:52:36 2010 Number of vulnerabilities Open ports : 56 High : 0 Medium : 7 Low : Remote host information Operating System : NetBIOS name : 62 Solaris 10 (sparc) CTSA DNS name : [^] Back to 156.111.5.207 Port general (0/tcp) [-/+] Nessus Scan Information Information about this scan : Nessus version : 4.2.2 Plugin feed version : 201010061134 Type of plugin feed : ProfessionalFeed (Direct) Scanner IP : 156.111.60.83 Port scanner(s) : snmp_scanner Port range : default Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Optimize the test : yes CGI scanning : disabled Web application tests : disabled Max hosts : 40 Max checks : 5 Recv timeout : 5 Backports : Detected Scan Start Date : 2010/10/6 21:49 Scan duration : 191 sec Plugin ID: 19506 Ethernet card brand Synopsis: The manufacturer can be deduced from the Ethernet OUI. Description: Each ethernet MAC address starts with a 24-bit 'Organizationally Unique Identifier'. These OUI are registered by IEEE. Risk factor: None See also: http://standards.ieee.org/faqs/OUI.html See also: http://standards.ieee.org/regauth/oui/index.shtml Solution: n/a Plugin output: The following card manufacturers were identified : 00:14:4f:3b:50:fa : Sun Microsystems, Inc. 00:14:4f:3b:50:fa : Sun Microsystems, Inc. Plugin ID: 35716 Port pop3 (110/tcp) [-/+] Service Detection A POP3 server is running on this port. Plugin ID: 22964 POP Server Detection Synopsis: A POP server is listening on the remote port. Description: The remote host is running a server that understands the Post Office Protocol (POP), used by email clients to retrieve messages from a server, possibly across a network link. Risk factor: None See also: http://en.wikipedia.org/wiki/Post_Office_Protocol Solution: Disable this service if you do not use it. Plugin output: Remote POP server banner : +OK POP3 ctsa 2006e.96 server ready Plugin ID: 10185 Port rpc-portmapper (111/tcp) RPC Services Enumeration [-/+] Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 111 : - program: 100000 (portmapper), version: 4 - program: 100000 (portmapper), version: 3 - program: 100000 (portmapper), version: 2 Plugin ID: 11111 RPC portmapper Service Detection Synopsis: An ONC RPC portmapper is running on the remote host. Description: The RPC portmapper is running on this port. The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request. Risk factor: None Solution: n/a Plugin ID: 10223 RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 111 : - program: 100000 (portmapper), version: 4 - program: 100000 (portmapper), version: 3 - program: 100000 (portmapper), version: 2 Plugin ID: 11111 Port slinkysearch? (1225/tcp) [-/+] Port netbios-ns (137/udp) [-/+] Port netbios-dgm? (138/udp) [-/+] Port smb (139/tcp) [-/+] Port imap (143/tcp) [-/+] IMAP Service STARTTLS Command Support Synopsis: The remote mail service supports encrypting traffic. Description: The remote IMAP service supports the use of the 'STARTTLS' command to switch from a plaintext to an encrypted communications channel. Risk factor: None See also: http://en.wikipedia.org/wiki/STARTTLS See also: http://tools.ietf.org/html/rfc2595 Solution: n/a Plugin output: Here is the IMAP server's SSL certificate that Nessus was able to collect after sending a 'STARTTLS' command : ------------------------------ snip ----------------------------- Subject Name: Country: US State/Province: New York Locality: New York City Organization: Columbia University Organization Unit: CTSA Common Name: ctsa.cpmc.columbia.edu Email Address: reidar@columbia.edu Issuer Name: Country: US State/Province: New York Locality: New York City Organization: Columbia University Organization Unit: CTSA Common Name: ctsa.cpmc.columbia.edu Email Address: reidar@columbia.edu Serial Number: 00 8C 9A EC 4B D1 89 B3 A4 Version: 3 Signature Algorithm: SHA-1 With RSA Encryption Not Valid Before: Apr 10 19:50:32 2009 GMT Not Valid After: Apr 08 19:50:32 2019 GMT Public Key Info: Algorithm: RSA Encryption Public Key: 00 C8 CA 5D 7F 0F DC C6 C3 4B C5 AE 34 B4 C2 08 75 4F CC 08 16 D1 59 B1 89 1F 2E 96 83 A6 DB 53 D4 4D 77 10 83 85 5F F2 78 12 60 48 61 1B 69 E2 51 0F 41 48 91 44 0D B9 90 C7 20 7B DA 59 26 A0 39 9E DB 4A 8E 69 D2 66 02 A1 AA 31 E8 8A DF AD BE 50 F6 09 1E 7E A3 8F B1 1F D4 E7 47 5A FD E1 EA 1A 04 0E D9 73 C3 11 C1 14 BD 94 13 79 5F B7 95 DE 9B EC 29 72 DA B3 9D 03 75 83 3A 8D FB EE C3 Exponent: 01 00 01 Signature: 00 72 AE E1 02 87 0F D7 DD 52 75 23 F1 F0 75 CC 29 67 B4 F0 66 FA CC 1A 29 88 03 A5 08 26 9B 84 50 D1 B0 9F AD 9C 30 B5 B4 8F 40 89 65 E2 B2 8C 75 3E 37 CA FC F3 9C 5D 83 B8 EB F6 D1 B7 20 D6 3F E4 65 CB 26 1E 1B AE E4 B6 68 16 C2 27 BF 5B 9B 48 BB 8E E8 2B 78 46 D0 7D BA A8 A2 F0 39 3F FA D0 62 8F 6B BF 81 67 3E 6E 9D 72 73 49 87 9A 14 45 67 C5 86 FE 9F 0B B2 BD BC F2 52 BF 55 D3 A7 Extension: Subject Key Identifier (2.5.29.14) Critical: 0 Subject Key Identifier: A8 0E 4D 77 AF DB D3 A2 31 2B F2 EE DC A7 A3 AF 61 62 AE 30 Extension: Authority Key Identifier (2.5.29.35) Critical: 0 Extension: Basic Constraints (2.5.29.19) Critical: 0 Data: 30 03 01 01 FF ------------------------------ snip ----------------------------Plugin ID: 42085 IMAP Service Banner Retrieval Synopsis: An IMAP server is running on the remote host. Description: An IMAP (Internet Message Access Protocol) server is installed and running on the remote host. Risk factor: None Solution: n/a Plugin output: The remote imap server banner is : * OK [CAPABILITY IMAP4REV1 LITERAL+ SASL-IR LOGIN-REFERRALS STARTTLS LOGINDISABLED] ctsa IMAP4rev1 2006e.378 at Wed, 6 Oct 2010 21:50:14 -0400 (EDT) Plugin ID: 11414 Service Detection An IMAP server is running on this port. Plugin ID: 22964 Port saiscm? (1501/tcp) [-/+] Port www (1581/tcp) [-/+] Service Detection A web server is running on this port. Plugin ID: 22964 Port snmp (161/udp) [-/+] SNMP Agent Default Community Name (public) Synopsis: The community name of the remote SNMP server can be guessed. Description: It is possible to obtain the default community name of the remote SNMP server. An attacker may use this information to gain more knowledge about the remote host, or to change the configuration of the remote system (if the default community allow such modifications). Risk factor: Medium CVSS Base Score:5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution: Disable the SNMP service on the remote host if you do not use it, filter incoming UDP packets going to this port, or change the default community string. Plugin output: The remote SNMP server replies to the following default community string : - public Plugin ID: 41028 CVE: CVE-1999-0517 BID: 2112 Other references: OSVDB:209 SNMP Request Network Interfaces Enumeration Synopsis: The list of network interfaces cards of the remote host can be obtained via SNMP. Description: It is possible to obtain the list of the network interfaces installed on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.2.1.0 An attacker may use this information to gain more knowledge about the target host. Risk factor: None Solution: Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Plugin output: Interface 1 information : ifIndex : 1 ifDescr : lo0 ifPhysAddress : Interface 2 information : ifIndex : 2 ifDescr : ce0 ifPhysAddress : 00144f3b50fa Interface 3 information : ifIndex : 3 ifDescr : ce0:3 ifPhysAddress : 00144f3b50fa Plugin ID: 10551 SNMP Query Installed Software Disclosure Synopsis: The list of software installed on the remote host can be obtained via SNMP. Description: It is possible to obtain the list of installed software on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.25.6.3.1.2 An attacker may use this information to gain more knowledge about the target host. Risk factor: None Solution: Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Plugin output: SUNWocfd SUNWcsu SUNWcsr SUNWcsl SUNWcnetr SUNWckr SUNWkvm SUNWcar SUNWcakr FJSVvplu FJSVvplr FJSVhea SUNWcsd SUNWgssc SUNWgss SUNWzlib SUNWopenssl-libraries SUNWsshcu SUNWsshdr SUNWsshdu SUNWsshr SUNWsshu SUNWperl584core SUNWperl584usr SUNWesu SUNWlibC SUNWlibmsr SUNWlibms SUNWicu SUNWlexpt SUNWfontconfig-root SUNWfreetype2 SUNWfontconfig SUNWstsf SUNWstsfr SUNWwbsup SUNWinstall-patch-utils-root SUNWswmt SUNWxwrtl SUNWxwice SUNWbzip SUNWxwfnt SUNWxwdv SUNWxwplr SUNWcpp SUNWdtcor SUNWxwplt SUNWctpls SUNWmfrun SUNWj3rt SUNWlxml SUNWlibpopt SUNWxorg-clientlibs SUNWpng SUNWTiff SUNWjpg SUNWgnome-base-libs-root SUNWgnome-base-libsshare SUNWgnome-base-libs SUNWgnome-component-root SUNWgnome-component SUNWgnome-config-root SUNWgnome-configshare SUNWgnome-config SUNWgnome-vfs-root SUNWgnome-vfs-share SUNWgcmn SUNWsmbar SUNWsmbau SUNWgnome-vfs SUNWlibexif SUNWgnome-a11y-base-libs SUNWgnome-audio SUNWgnome-libs-root SUNWgnome-libs-share SUNWgnome-libs SUNWgnome-panel-root SUNWgnome-panel-share SUNWgnome-panel SUNWswupcl SUNWswupclr SUNWdtdmr SUNWtltk SUNWxwcft SUNWxwopt SUNWdtbas SUNWgzip SUNWj5rt SUNWocfr SUNWocf SUNWdtdte SUNWdtdmn SUNWdticn SUNWdthez SUNWfrhez SUNWib SUNWtavor SUNWj3dev SUNWtcatu SUNWtcatr SUNWdtim SUNWfrim SUNWeurf SUNWi15rf SUNWi15cs SUNWi1cs SUNWfriso1 SUNWadmlib-sysid SUNWadmr SUNWadmap SUNWmdr SUNWmdu SUNWadmc SUNWadmfr SUNWadmfw SUNWlur SUNWluu SUNWfrlu SUNWmoznspr SUNWmozilla SUNWfrmoz SUNWadmj SUNWwbapi SUNWaudit SUNWjsnmp SUNWwbcou SUNWjhrt SUNWmccom SUNWmcc SUNWmc SUNWwbmc SUNWmcdev SUNWfrsmc SUNWwbcor SUNWwbpro SUNWmga SUNWmgapp SUNWrmui SUNWfrmui SUNWtcpd SUNWtcsh SUNWfros SUNWtecla SUNWter SUNWpl5u SUNWtexi SUNWcpcu FJSVcpcu SUNWdtjxt SUNWjdsrm SUNWtftp SUNWkrbr SUNWkrbu SUNWtnetc SUNWbip SUNWrcmdc SUNWrcmds SUNWscpr SUNWscpu SUNWjmf SUNWdtscm SUNWdtdst SUNWpmu SUNWpmr SUNWpmowr SUNWpmowu SUNWfrpmw SUNWtftpr FJSVcsr SUNWfmd SUNWtiu8 FJSVfmd SUNWpr SUNWtls SUNWmdb FJSVmdb SUNWspl SUNWfrspl SUNWprd SUNWtlsd SUNWfrwbc SUNWtlsu SUNWmdbr FJSVmdbr FJSVpiclu SUNWdtwm SUNWfrwm SUNW1251f SUNW1394 SUNWproduct-registry-root SUNWwsr2 SUNWfrws2 SUNW1394h SUNWtoo SUNWtltkd SUNWwsrv SUNWfrwsv SUNW5xmft SUNWxwsvr SUNWfrxwsvr SUNWsadml SUNWfsadl SUNWtltkm SUNWGlib SUNWscgui SUNWfscgu SUNWtnamd SUNWGtkr SUNWtnamr SUNWtnetd SUNWfsfw SUNWGtku SUNWtnetr SUNWtnfc SUNWftltk SUNWPython-share SUNWPython SUNWxwacx SUNWfwacx SUNWtnfd SUNWowbcp SUNWfwbcp SUNWwbdev SUNWfwdev SUNWfxplt SUNWtxfnt SUNWlxsl SUNWgnome-help-viewer-share SUNWgnome-help-viewer SUNWgnomel10ndocument-de SUNWPython-devel SUNWTcl SUNWucbt SUNWudaplr SUNWudaplu SUNWipoib SUNWudapltu SUNWudapltr SUNWTiff-devel SUNWudfr SUNWudf SUNWTiff-devel-share SUNWaudd SUNWusb SUNWusbs SUNWuedg SUNWTk SUNWugen SUNWugenu SUNWuiu8 SUNWa2psr SUNWimagick SUNWbash SUNWpsutils SUNWa2psu SUNWdoc SUNWuium SUNWgnome-terminal-devel SUNWulcf SUNWgnome-terminal-devel-share SUNWgnome-terminal-root SUNWgnome-terminal-share SUNWaccr SUNWusbu SUNWxi18n SUNWxim SUNWuxlcf SUNWgnome-text-editor-root SUNWgnome-texteditor-share SUNWgnome-file-mgr-root SUNWgnome-file-mgr-share SUNWpcr SUNWpcu SUNWscplp SUNWgnome-print-root SUNWgnomeprint-share SUNWgnome-print SUNWgnome-file-mgr SUNWgnome-texteditor SUNWaccu SUNWvid SUNWgnome-text-editor-devel SUNWvld SUNWvldu SUNWaclg SUNWvolr SUNWgnome-l10ndocument-es SUNWnfsckr SUNWnfscr SUNWnfscu SUNWvolu SUNWant SUNWbcp SUNWcslr SUNWacroread SUNWgnome-themes-share SUNWgnomethemes SUNWwbdoc SUNWwebminr SUNWwebminu SUNWacroreadplugin SUNWgnome-ui-designer-share SUNWgnome-ui-designer SUNWgnome-l10ndocument-extra SUNWxge SUNWgnome-user-docs SUNWafbcf SUNWgnome-l10ndocument-fr SUNWgnome-utility-appletsroot SUNWgnome-utility-applets-share SUNWgnome-utility-applets SUNWafb SUNWafbr SUNWafbw SUNWgnome-vfs-devel SUNWgnomevfs-devel-share SUNWapbas SUNWgnome-wm-root SUNWgnome-wmshare SUNWgnome-wm SUNWapch2r SUNWapch2u SUNWapch2d SUNWgnome-wm-devel SUNWgnome-l10ndocument-it SUNWrsg SUNWgnome-xml-share SUNWgnome-xml-root SUNWwgetr SUNWlibgcrypt SUNWgnutls SUNWwgetu SUNWgnutls-devel SUNWgpch SUNWgsfot SUNWgsfst SUNWhpijs SUNWgimpprint SUNWgscr SUNWapchr SUNWapchu SUNWapchd SUNWxcu4 SUNWsprot SUNWxcu4t SUNWxcu6 SUNWxilrl SUNWxildh SUNWgssdh SUNWgssk SUNWapmsc SUNWapoc SUNWapcj SUNWxilh SUNWgtar SUNWxilow SUNWbtool SUNWapct SUNWhea SUNWgnome-l10ndocument-ja SUNWapdc SUNWxilvl SUNWapdc-root SUNWhiu8 SUNWxorgcompatlinks SUNWxwinc SUNWxorg-headers SUNWhmd SUNWjaf SUNWjmail SUNWxsrt SUNWxrgrt SUNWhmdu SUNWxrpcrt SUNWapocadapter-gconf SUNWi13rf SUNWxscreensaver-hacks SUNWarc SUNWarcr SUNWglrt SUNWxscreensaver-hacks-gl SUNWarrf SUNWi1of SUNWasac SUNWascmn SUNWgnome-l10ndocument-ko SUNWxwcsl SUNWasdb SUNWxwdim SUNWxwdem SUNWi2rf SUNWasdem SUNWxwdxm SUNWxwfa SUNWi4rf SUNWi5rf SUNWxwfs SUNWi7rf SUNWxwhl SUNWgnome-l10ndocument-ptBR SUNWxwkey SUNWxwman SUNWi8rf SUNWxwmod SUNWxwoft SUNWi9rf SUNWxwpft SUNWxwpsr SUNWxwpl SUNWgnome-l10ndocument-sv SUNWicud SUNWidnl SUNWidnd SUNWxwpmn SUNWidnu SUNWxwslb SUNWifbcf SUNWxwsrc SUNWifb SUNWifbr SUNWxwsrv SUNWfbc SUNWifbw SUNWluxop SUNWses SUNWssad SUNWifp SUNWxwxst SUNWxwxft SUNWifph SUNWnisr SUNWnisu SUNWypr SUNWiniu8 SUNWgnome-l10ndocumentzhCN SUNWypu SUNWzebrar SUNWinst SUNWzebrau SUNWzip SUNWipc SUNWzoner SUNWluzone SUNWpoolr SUNWpool SUNWzoneu SUNWzsh SUNWipfr SUNWasdemdb SUNWzuluc SUNWipfu SUNWzulu SUNWzulur SUNWipmi TSIpgx TSIpgxw SUNWzuluw SUNWpapi SUNWippcore SUNWipplr SUNWasjdoc SUNWipplu SUNWiqfs SUNWiquc SUNWiqum SUNWiqdoc SUNWgnome-l10ndocument-zhHK SUNWasman SMEvplr SUNWaspell-share SUNWaspell SMEvplu SUNWaspell-devel SUNWaspellen-share SUNWaspell-en SUNWiqjx SUNWiqr SUNWasr SUNWiqu SUNWast SUNWasu SUNWiscsir SUNWiscsiu SUNWloc SUNWislcc SUNWisolc SUNWixgb SUNWj3cfg SUNWced SUNWgnomel10ndocument-zhTW SUNWj3dmo SUNWcg6 SUNWcpc SUNWcpr SUNWasut SUNWcti2 SUNWj3rtx SUNWcvc SUNWj3dvx SUNWatfsr SUNWj3irt SUNWcvcr SUNWj3man SUNWatfsu SUNWefc SUNWdrcr SUNWauda SUNWdrr SUNWaudf SUNWgnome-l10nmessages-cs SUNWaudh SUNWffb SUNWgnome-l10nmessages-de SUNWpiclu SUNWfruid SUNWfruip SUNWciu8 SUNWjiu8 SUNWkiu8 SUNWautoef SUNWgnome-l10nmessages-es SUNWgfb SUNWav1394 SUNWj5cfg SUNWgnome-l10nmessages-extra SUNWj5dev SUNWglmr SUNWi2cr SUNWbart SUNWidn SUNWjfb SUNWbindr SUNWbind SUNWkmp2r SUNWgnome-l10nmessages-fr SUNWj5dmo SUNWbinutils SUNWgnomel10nmessages-hu SUNWluxd SUNWgnome-l10nmessages-it SUNWbipr SUNWgccruntime SUNWbison SUNWm64 SUNWgnome-l10nmessages-ja SUNWbnur SUNWgnome-l10nmessages-ko SUNWm64xr SUNWpfb SUNWgnome-l10nmessages-pl SUNWgnome-l10nmessages-ptBR SUNWbnuu SUNWpstl SUNWgnome-l10nmessages-ru SUNWsckm SUNWbsr SUNWsckmr SUNWsckmu SUNWbsu SUNWgnomel10nmessages-sv SUNWsfdr SUNWsfdrr SUNWgnome-l10nmessageszhCN SUNWcdrw SUNWj5rtx SUNWj5dmx SUNWsior SUNWgnomel10nmessages-zhHK SUNWstc SUNWcea SUNWus SUNWj5dvx SUNWgnome-l10nmessages-zhTW SUNWcedu SUNWwrsa SUNWj5man SUNWcfcl SUNWrsmo SUNWwrsm SUNWwrsd SUNWgttf SUNWcfclr SUNWcfpl SUNWwrsu SUNWcfplr SUNWcg6h SUNWlccom SUNWiiimu JSatsvu JSatsvr SUNWgttfe JSatsvw SUNWjai SUNW5ttf SUNWjaiimageio SUNWcnsr SUNWcnsu SUNWjato SUNW5ttfe SUNW5xfnt SUNWabcp SUNWjatodoc SUNWjatodmo SUNWale SUNWman SUNWaled SUNWgxfnt SUNWhacx SUNWhadis SUNWauaos SUNWauadt SUNWauaow SUNWcacx SUNWhadma SUNWjavaapps SUNWcadis SUNWhbcp SUNWdtab SUNWhdab SUNWcadma SUNWcamos SUNWcamdt SUNWhdbas SUNWjaxp SUNWcamow SUNWcasu SUNWnfssu SUNWdclnt SUNWhsmc SUNWhmga SUNWhdcl SUNWhddst SUNWjcom SUNWcbcp SUNWcstl SUNWjdic SUNWhddte SUNWcdab SUNWdtezt SUNWhdezt SUNWhdft SUNWcdbas SUNWjds-registration SUNWdhcsr SUNWdhcsu SUNWdhcm SUNWhdhcm SUNWdthe SUNWhdhe SUNWcsmc SUNWcmga SUNWcdcl SUNWjdsver SUNWlpmsg SUNWpsr SUNWpsu SUNWppm SUNWpsf SUNWmp SUNWctlu SUNWdthev SUNWhdhev SUNWcxmft SUNWjfbcf SUNWcddst SUNWjfbr SUNWjfbw SUNWhdhez SUNWcddte SUNWjfca SUNWdcsr SUNWdcsu SUNWhdicn SUNWdfbh SUNWhdim SUNWjfcau SUNWhdt SUNWjhdoc SUNWjhdem SUNWcdezt SUNWhdwm SUNWcdft SUNWdhcsb SUNWhepmw SUNWcdhcm SUNWjhdev SUNWfdl SUNWhfdl SUNWhimoz SUNWcdhe SUNWdial SUNWjib SUNWcdhev SUNWhksmc SUNWhkmga SUNWhkdcl SUNWhkdt SUNWhkleu SUNWhkeue SUNWdialh SUNWfsmgtu SUNWfsmgtr SUNWdmgtr SUNWhkezt SUNWhkfnt SUNWdmgtu SUNWcdhez SUNWcdicn SUNWlvma SUNWlvmr SUNWlvmg SUNWhklvmg SUNWjmfmp3 SUNWdpl SUNWcdim SUNWcdt SUNWhkplt SUNWjpg-devel SUNWjpg-devel-share SUNWcdwm SUNWhkrmui SUNWjre-config SUNWhkttf SUNWdtct SUNWjre-config-plugin SUNWhkxe SUNWcepmw SUNWdtdem SUNWhkxwsvr SUNWjss SUNWladm SUNWhladm SUNWi2cs SUNWceuos SUNWceudt SUNWhleu SUNWjxmft SUNWhleu2 SUNWceuow SUNWhleue SUNWkdcr SUNWhlvma SUNWkdcu SUNWcfdl SUNWhlvmg SUNWkey SUNWmconr SUNWmctag SUNWmcon SUNWhmcon SUNWciqu SUNWhmctg SUNWciquc SUNWdthed SUNWkoi8f SUNWcjaf SUNWcjmail SUNWcladm SUNWhmoz SUNWhos SUNWcleu SUNWcleu2 SUNWkxmft SUNWolrte SUNWhorte SUNWcleue SUNWlcl SUNWless SUNWpdas SUNWhpdas SUNWdtinc SUNWclvma SUNWclvmg SUNWdtlog SUNWdtma SUNWlibCf SUNWcmcon SUNWllc SUNWdtmad SUNWcmctg SUNWppror SUNWpprou SUNWhpprou SUNWlibexif-devel SUNWdtmaz SUNWhrmui SUNWdtrc SUNWlibgcrypt-devel SUNWlibmr SUNWlibm SUNWcmoz SUNWdtrp SUNWhsadl SUNWlibpopt-devel SUNWlibpopt-devel-share SUNWcorte SUNWlibsasl SUNWhscgu SUNWlibusb SUNWlibusbugen SUNWcos SUNWllcr SUNWefcl SUNWhsfw SUNWefcr SUNWlldap SUNWefcu SUNWerid SUNWcpdas SUNWeuodf SUNWhtltk SUNWcpprou SUNWluxl SUNWcrmui SUNWcsadl SUNWluxopr SUNWcscgu SUNWhttf SUNWeuxwe SUNWcsfw SUNWctltk SUNWcttf SUNWevolution-libs-share SUNWevolution-libs SUNWevolution-root SUNWevolution-share SUNWevolution SUNWhttfe SUNWhudc SUNWcttfe SUNWevolution-devel SUNWhufnt SUNWcudc SUNWhwbc SUNWevolution-devel-share SUNWcufnt SUNWevolution-exchange-share SUNWevolution-exchange SUNWcwbc SUNWhwbcp SUNWevolution-exchange-root SUNWm64cf SUNWm64w SUNWcwbcp SUNWhwdev SUNWcwdev SUNWcwsr2 SUNWhwsr2 SUNWcwsrv SUNWevolution-libs-devel SUNWhwsrv SUNWcxe SUNWcxfnt SUNWhxe SUNWhxfnt SUNWcxman SUNWcxplt SUNWcxwsvr SUNWdbcp SUNWdesmc SPZHgc SUNWdmgp SUNWddcl SUNWddhcm SUNWmcex SUNWhxman SUNWevolution-socs-connectshare SUNWevolution-socs-connect SUNWdebas SUNWdedis SUNWdedma SUNWhxplt SUNWfac SUNWdedst SUNWhxwsvr SUNWdedte SUNWdehe SUNWdehed SUNWfchbar SUNWfchba SUNWdehev SUNWi13cs SUNWfctl SUNWfcip SPJAgc SUNWmcos SUNWfcmdb SUNWfcp SUNWdehez SUNWmcosx SUNWdeim SUNWfcsm SUNWdeiso1 SUNWdelu SUNWi5cs SUNWdemoz SUNWi7cs SUNWmdar SUNWdeos SUNWsmapi SUNWmdau SUNWdepmw SUNWffbcf SUNWi9cs SUNWmdbdm SUNWdespl SUNWibcp SUNWdewbc SUNWffbw SUNWmddr SPROgc SUNWitsmc SUNWimgp SUNWidcl SUNWdewm SUNWdews2 SUNWdewsv SUNWdexwsvr SUNWmfdev SUNWidhcm SUNWffiltersr SUNWdfdl SUNWmfman SUNWffiltersu SUNWdladm SUNWdlvma SUNWdlvmg SUNWifdl SUNWdmcon SUNWflexruntime SUNWflexlex SUNWiiimr SUNWdmctg SUNWdorte SUNWdpdas SUNWiladm SUNWdpprou SUNWilvma SUNWdrmui SUNWdsadl SUNWilvmg SUNWdscgu SUNWimcon SUNWdsfw SUNWdtltk SUNWdwacx SUNWdwbcp SUNWdwdev SUNWmibii SUNWfontconfigdocs SUNWdxplt SUNWsasnm SUNWsadmi SUNWsacom SUNWmipr SUNWimctg SUNWmipu SUNWessmc SUNWemgp SUNWedcl SUNWmkcd SUNWedhcm SUNWfppd SUNWmlib SUNWeeuos SUNWeeudt SUNWeeuow SUNWindt SUNWefdl SUNWeladm SUNWelvma SUNWelvmg SUNWinfnt SUNWemcon SUNWfsexam-root SUNWfsexam SUNWemctg SUNWinleu SUNWeorte SUNWinplt SUNWfss SUNWepdas SUNWepprou SUNWftdur SUNWermui SUNWftduu SUNWftpr SUNWinttf SUNWesadl SUNWesbas SUNWftpu SUNWescgu SUNWiorte SUNWesdis SUNWipdas SUNWfwdcu SUNWfwdc SUNWipprou SUNWesdma SUNWfwdcd SUNWesdst SUNWgcc SUNWirmui SUNWesdte SUNWisadl SUNWesfw SUNWeshe SUNWiscgu SUNWeshed SUNWeshev SUNWisfw SPZHscl SUNWitbas SUNWmlibe SUNWged SUNWgedu SUNWgfbcf SUNWeshez SUNWmlibh SUNWitdis SUNWmlibk SUNWmlibl SUNWitdma SUNWmozchat SUNWmozdom-inspector SUNWmozjs-debugger SUNWmozmail SUNWmoznss SUNWmozpsm SUNWmozspell SUNWmozapoc-adapter SUNWitdst SUNWgfbr SUNWgfbw SUNWesim SUNWitdte SUNWggrp SUNWesiso1 SUNWeslu SUNWithe SUNWesmoz SUNWithed SUNWithev SUNWmozgm SUNWesos SUNWgldoc SUNWithez SUNWglrtu SUNWglsrz SUNWgldp SUNWespmw SUNWitim SUNWitiso1 SUNWitltk SUNWesspl SUNWitlu SUNWeswbc SUNWitmoz SUNWitos SUNWglrtx SUNWglsrx SUNWgldpx SUNWmozilla-devel SUNWitpmw SUNWglh SUNWeswm SUNWglow SUNWitspl SUNWitwbc SUNWesws2 SUNWeswsv SUNWitwm SUNWitws2 SUNWesxwsvr SUNWitwsv SUNWitxwsvr SUNWiwacx SUNWiwbcp SUNWiwdev SUNWetltk SUNWixplt SUNWj3jmp SUNWeu8df SUNWj5jmp SUNWeuluf SUNWeu8os SUNWjsmc SUNWjmga SUNWjadcl SUNWjadis SUNWmoznspr-devel SUNWjadma SUNWeudba SUNWjamoz SUNWglsr SUNWjasu SUNWeudbd SUNWmoznss-devel SUNWjbcp SUNWeudda SUNWeudhr SUNWjcs3f SUNWjdab SUNWglt SUNWeudhs SUNWgm4 SUNWjdbas SUNWgmake SUNWgnome-a11y-base-devel SUNWeudis SUNWeudiv SUNWgnome-a11y-base-devel-share SUNWmysqlr SUNWjddst SUNWeudlg SUNWmysqlu SUNWmysqlt SUNWgnome-a11ygok-share SUNWgnome-a11y-libs SUNWgnome-a11y-libs-share SUNWgnome-a11y-speech-share SUNWgnome-a11y-speech SUNWgnome-a11y-gok SUNWjddte SUNWgnome-a11y-gok-root SUNWeudmg SUNWjdhcm SUNWeuezt SUNWjdhe SUNWjdhed SUNWeuhe SUNWeuhed SUNWjdhev SUNWncar SUNWewacx SUNWjdhez SUNWgnome-a11y-libs-devel-share SUNWgnome-audiodevel SUNWgnome-libs-devel-share SUNWgnome-libs-devel SUNWgnome-a11y-libs-devel SUNWewdev SUNWexplt SUNWjdim SUNWncau SUNWfbcp SUNWfmgp SUNWfdcl SUNWjdma SUNWncft SUNWfdhcm SPJAscl SUNWgnome-a11y-poke-share SUNWgnome-a11ypoke SUNWjdoc SUNWffdl SUNWgnome-a11y-reader SUNWfladm SUNWflvma SUNWjdwm SUNWflvmg SUNWgnome-a11y-reader-devel SUNWnfsskr SUNWnfssr SUNWgnome-a11y-reader-root SUNWfmcon SUNWject SUNWfmctg SUNWjedev SUNWjedt SUNWntpr SUNWjeezt SUNWforte SUNWjfpre SUNWgnome-a11y-reader-share SUNWfpdas SUNWjeman SUNWntpu SUNWfpprou SUNWfrbas SUNWfrdis SUNWpmowm SUNWjepmm SUNWgnome-a11y-speech-devel SUNWjepmw SUNWfrdma SUNWjeudc SUNWocfh SUNWfrdst SUNWgnome-archive-mgr-root SUNWgnome-archive-mgr-share SUNWgnome-archive-mgr SUNWjfdl SUNWfrdte SUNWjfpr SPZHcc SUNWogg-vorbis SUNWfrhe SUNWfrhed SUNWogg-vorbis-devel SUNWfrhev SUNWjfpu SUNWogg-vorbis-devel-share SUNWgnome-audiodevel-share SUNWgnome-audio-root SUNWgnome-audio-share SUNWjfpue SUNWjfxmn SUNWjiqu SUNWgnome-base-libs-devel-share SUNWgnome-base-libs-devel SUNWjiquc SUNWopensp SUNWopenjade SUNWjjaf SUNWjjmail SUNWjladm SUNWjlvma SUNWopenjade-devel SUNWjlvmg SUNWopenjade-root SUNWjman SUNWjmane SUNWopenjade-share SUNWjmcon SUNWjmctg SUNWjmfrn SUNWopensp-devel SUNWopensp-root SUNWgnome-calculator-root SUNWgnome-calculator-share SUNWgnome-calculator SUNWopenspshare SUNWopenssl-commands SUNWjorte SUNWpcmci SUNWpcmcu SUNWpcmem SUNWopenssl-include SUNWjos SUNWgnome-camera SUNWgnome-camera-devel SUNWgnome-camera-share SUNWopensslman SUNWjpdas SUNWjpprou SUNWgnome-cd-root SUNWgnome-cdshare SUNWgnome-freedb-libs-root SUNWgnome-freedb-libs-share SUNWgnome-freedb-libs SUNWgnome-cd SUNWjrmui SUNWopensslr SUNWgnome-cd-burner CSKruby SUNWjsadl SUNWosdem SUNWgnomecd-burner-root SUNWjscag SUNWjwncr SUNWgnome-cd-burner-share SUNWjsfw SUNWpamsc SUNWjtlmn SUNWgnome-character-map-share SUNWgnome-character-map SUNWjtltk SUNWjwacx SUNWjwbc SUNWpcelx SUNWjwbcp SUNWperl-xml-parser SUNWgnome-commondevel SUNWjwbd SUNWgnome-common-devel-share SUNWjwncu SUNWjwncx SUNWpcsclite SUNWgnome-component-devel-share SUNWgnome-component-devel SUNWjwndt SUNWpcsclite-devel SUNWjwnsr SUNWpcser SUNWjwnsu SUNWpd SUNWgnome-config- devel SUNWjws2 SUNWgnome-config-devel-share SUNWjwsv SUNWgnome-config-editor-share SUNWgnome-config-editor SUNWpdu SUNWjxcft SUNWkadma SUNWperl-xml-parser-devel-share SUNWgnome-desktop-prefs-root SUNWgnome-desktop-prefs-share SUNWgnome-desktop-prefs SUNWgnome-desktop-prefs-devel SUNWperl584man SUNWjxfa SUNWjxplt SUNWjxfnt SUNWpfbcf SUNWgnome-dialog SUNWpfbw SUNWgnome-dialog-share SUNWphx SUNWpiclh SUNWjxim SUNWpiclr SUNWjxoft SUNWgnome-dictionaryroot SUNWgnome-dictionary-share SUNWgnome-dictionary SUNWgnome-display-mgr-root SUNWgnome-display-mgr-share SUNWgnome-session SUNWgnome-dtlogin-integration SUNWgnomedisplay-mgr SUNWpkgcmdsr SUNWpkgcmdsu SUNWpl5v SUNWpl5m SUNWjxpmn SUNWpl5p SUNWjxumn SUNWgnome-file-mgr-devel SUNWjxwsvr SUNWkacx SUNWkadis SUNWplowr SUNWkbcp SUNWgnome-fonts SUNWpmgr SUNWkdab SUNWpng-devel SUNWkdbas SUNWpng-devel-share SUNWksmc SUNWkmga SUNWkdcl SUNWgnomefun-applets-root SUNWgnome-fun-applets-share SUNWgnome-funapplets SUNWkdcst SUNWkddst SUNWpppd SUNWpppdr SUNWkddte SUNWgnome-games SUNWpppdu SUNWpppdt SUNWpppg SUNWkdezt SUNWppro-plugin-sunos-base SUNWgnome-games-root SUNWkdft SUNWkdhcm SUNWkdhe SUNWpsdpr SUNWpsm-lpd SUNWgnomegames-share SUNWkdhev SUNWkdhez SUNWqfed SUNWkdicn SUNWqfedu SUNWkdim SUNWqlc SUNWkdt SUNWqos SUNWqosu SUNWkdwm SUNWqus SUNWgnome-hex-editor-root SUNWkpdas SUNWgnome-hex-editor-share SUNWgnome-hex-editor SUNWgnomehex-editor-devel SUNWkepmw SUNWqusu SUNWrcapr SUNWrcapu SUNWkfdl SUNWkladm SUNWrcmdr SUNWgnome-im-client SUNWkleu SUNWgnome-im-client-share SUNWrmodu SUNWrmwbr SUNWgnomeimg-editor-share SUNWgnome-img-editor SUNWrmwbu SUNWkleue SUNWroute SUNWkos SUNWgnome-img-editor-devel SUNWrpcib SUNWklvma SUNWrpm SUNWklvmg SUNWgnome-img-editor-develshare SUNWkmcon SUNWrsgk SUNWkmctg SUNWrsm SUNWrtvc SUNWrtvcl SUNWgnome-img-editor-root SUNWrtvcu SUNWkomoz SUNWsbp2 SUNWscbcp SUNWgnome-img-viewer-root SUNWgnomeimg-viewer-share SUNWgnome-img-viewer SUNWkorte SUNWscmhdlr SUNWkpprou SUNWkrmui SUNWscsa1394 SUNWgnome-internetapplets-root SUNWgnome-internet-applets-share SUNWgnome-internetapplets SUNWserr SUNWksadl SUNWseru SUNWgnome-intranet-appletsroot SUNWgnome-intranet-applets-share SUNWgnome-intranet-applets SUNWkscgu SUNWserweb SUNWgnome-media-root SUNWgnomemedia-share SUNWgnome-media SUNWksfw SUNWsfdoc SUNWgnomejdshelp-share SUNWgnome-jdshelp SUNWsfinf SUNWktltk SUNWkttf SUNWsfman SUNWsfwdemo SUNWkttfe SUNWsfwhea SUNWgnomemedia-devel SUNWslpr SUNWgnome-media-devel-share SUNWgnomemedia-player SUNWgnome-media-player-root SUNWslpu SUNWgnomemedia-player-share SUNWsmagt SUNWgnome-mm-applets-root SUNWgnome-mm-applets-share SUNWgnome-mm-applets SUNWgnomepanel-devel-share SUNWgnome-panel-devel SUNWkxe SUNWsmbac SUNWkudc SUNWgnome-pdf-viewer-root SUNWgnome-pdf-viewer-share SUNWgnome-pdf-viewer SUNWkuxft SUNWgnome-perf-meter SUNWsmcmd SUNWgnome-perf-meter-root SUNWgnome-perf-metershare SUNWgnome-print-devel SUNWgnome-print-devel-share SUNWgnome-project SUNWsmdoc SUNWgnome-project-devel SUNWgnome-project-devel-share SUNWgnome-project-share SUNWsmmgr SUNWgnome-ps-viewer SUNWgnome-ps-viewer-root SUNWgnome-ps-viewer-share SUNWgnome-removable-media SUNWgnome-removable-media-share SUNWsndmr SUNWgnome-searchtool-root SUNWgnome-search-tool-share SUNWgnome-search-tool SUNWkwbc SUNWkwsrv SUNWgnome-session-root SUNWkwbcp SUNWgnome-session-share SUNWgnome-sound-recorder-root SUNWgnome-sound-recorder-share SUNWgnome-sound-recorder SUNWgnome-spell-share SUNWgnome-spell SUNWgnome-sys-suspend SUNWgnome-sys-suspend-share SUNWgnome-terminal SUNWsndmu SUNWkwdev SUNWkwsr2 SUNWkxfnt SUNWkxfte SUNWkxman SUNWkxplt SUNWkxwsvr SUNWlocaledefsrc SUNWmeaos SUNWmeadt SUNWmeaow SUNWnafos SUNWnafdt SUNWnafow SUNWnamos SUNWnamdt SUNWnamow SUNWneuos SUNWneudt SUNWneuow SUNWplmoz SUNWplow SUNWplow1 SUNWplxwsvr SUNWptmoz SUNWptxwsvr SUNWrumoz SUNWruxwsvr SUNWsamos SUNWsamdt SUNWsamow SUNWsvsmc SUNWsmgp SUNWsdcl SUNWsdhcm SUNWseuos SUNWseudt SUNWseuow SUNWsfdl SUNWsladm SUNWslvma SUNWslvmg SUNWsmcon SUNWsmctg SUNWsorte SUNWspdas SUNWspprou SUNWsrmui SUNWssadl SUNWsscgu SUNWssfw SUNWstardict SUNWstardict-root SUNWstltk SUNWsunpinyin SUNWsvbas SUNWdc SUNWsvdis SUNWsvdma SUNWsvdst SUNWsvdte SUNWsvhe SUNWsvhed SUNWsvhev SUNWsvhez SUNWsvim SUNWsviso1 SUNWsvlu SUNWsvmoz SUNWsvos SUNWsvpmw SUNWsvspl SUNWsvwbc SUNWsvwm SUNWsvws2 SUNWsvwsv SUNWsvxwsvr SUNWswacx SUNWswdev SUNWsxplt SUNWtdbas SUNWtddst SUNWtddte SUNWtdft SUNWtdwm SUNWtleu SUNWtxplt SUNWudct SUNWvbcp SUNWvwbcp SUNWweuos SUNWweudt SUNWweuow SUNWsolnm SUNWsom SUNWsogm SUNWspnego SUNWsra SUNWsrh SUNWvts SUNWvtsmn SUNWvtsr SUNWvtsts SUNWccccrr SUNWccccr SUNWccsign SUNWcsmauth SUNWccfw SUNWbreg SUNWcctpx SUNWccccfg SUNWccfwctrl SUNWccinv SUNWupdatemgru SUNWupdatemgrr SUNWzfskr SUNWzfsr SUNWzfsu CSWpkgget CSWcommon CSWzlib CSWosslrt CSWbdb44 CSWiconv CSWkrb5lib CSWlibmm CSWlibnet CSWgcrypt CSWlibxml2 CSWreadline CSWunixodbc CSWphp5 CSWmysql5rt CSWap2modphp5 CSWexpat CSWgdbm CSWggettext CSWgsed CSWbdb4 CSWsasl CSWoldaprt CSWperl CSWncurses CSWapache2c CSWap2prefork CSWapache2 SMClgcc346 SMCliconv SMCgcc SMCzlib SMCncurs SMCmysql SFWmphp SFWmyjdb SMCsudo CSWpmnetdaemon CSWpmplrpc CSWpmdbi SMCossl SMCwget SUNWpostgr-libs SUNWpostgr SUNWpostgr-serverdata SUNWpostgr-server SMCreadl SMCsamba CSWphp5mysql CSWossldevel CSWosslutils CSWossl CSWsqlite3 CSWapache2rt CSWsunmath CSWglib2 CSWlibpopt CSWlibidl CSWorbit2 CSWbonobo2 CSWftype2 CSWfconfig CSWgpgerr CSWopencdk CSWgnutls CSWjpeg CSWlibatk CSWrenderdev CSWlibxrender CSWpng CSWlibcairo CSWtiff CSWlibcups CSWlibxft2 CSWpango CSWgtk2 CSWgconf2 CSWbzip2 CSWlibdbus CSWdbusglib CSWfam CSWgnomevfs2 CSWlibart CSWaudiofile CSWesound CSWlibglade2 CSWlibgnome CSWlibgnomecanvas CSWlibbonoboui CSWgnomekeyring CSWlibgnomeui SMCimap SFWglib2 SFWatk SFWcairo SFWpango SFWgtk2 SFWdbus SFWdbus-glib SFWfirefox SUNWcbreg SUNWdbreg SUNWebreg SUNWfbreg SUNWhbreg SUNWibreg SUNWjbreg SUNWkbreg SUNWsbreg SUNWcupdatemgru SUNWdupdatemgru SUNWeupdatemgru SUNWfupdatemgru SUNWhupdatemgru SPJAcc SUNWiupdatemgru SUNWjupdatemgru SUNWkupdatemgru SUNWsupdatemgru SPROdwrfb SPROmrdwf SPJAmrdwf SPZHmrdwf SPROdwrfx SPROlang SPJAlang SPZHlang SPROlangx SPROsbld SPJAsbld SPZHsbld SPROsbldx SPROlcxs SPROrdbkb SPROrdbkx SPROild SPJAild SPZHild SPROildx SPROcc SPROutool SPJAutool SPZHutool SPROsvc SPJAsvc SPZHsvc SPROmrcc SPJAmrcc SPZHmrcc SPROmrcom SPJAmrcom SPZHmrcom SPROmrild SPJAmrild SPZHmrild SPROmr3m SPJAmr3m SPZHmr3m SPROmrtcv SPJAmrtcv SPZHmrtcv SPROmrdmk SPJAmrdmk SPZHmrdmk SPROmride SPJAmride SPZHmride SPROm9xs SPROm9xsx SPROm9xpx SPROsunms SPROsmsx SPROsmpx SPROmrsbe SPJAmrsbe SPZHmrsbe SPROsbe SPROsnit SPJAsnit SPZHsnit SPROpnsn SPROfd SPJAfd SPROcpl SPJAcpl SPZHcpl SPROcplx SPROcmpl SPROtlbn7 SPROtll7 SPROtl7x SPROtll7x SPROscl SPROsclx SPROmrstd SPZHmrstd SPROmrcpl SPJAmrcpl SPZHmrcpl SPROstl4h SPROstl4a SPROstl4o SPROstl4x SPROstl4y SPROftool SPJAftool SPZHftool SPROl90 SPROl90x SPROl90s SPROl90sx SPROf90 SPJAf90 SPZHf90 SPROmrftn SPJAmrftn SPZHmrftn SPROl77s SPROl77sx SPROlgc SPROgcx SPROlgcx SPROlklnt SPJAlklnt SPZHlklnt SPROmrmp SPJAmrmp SPZHmrmp SPROdbx SPJAdbx SPZHdbx SPROdbxx SPROjdbx SPJAjdbx SPZHjdbx SMCperl SMCpine CSVNclnt CSVNsrvr CSVNxtrs SMCjpeg SMClungif SMCxaw3d SMCxpm SMCemacs SMCsasl SMCtetex CSWdiffutils CSWpkgutil CSWneon CSWsvn SMCexpat TIVsmCapi TIVsmCba SUNWj6rt SUNWj6dev SUNWj6cfg SUNWj6man SUNWj6dmo SUNWj6rtx SUNWj6dvx SUNWj6dmx SUNWj6jmp Plugin ID: 19763 SNMP Query Running Process List Disclosure Synopsis: The list of processes running on the remote host can be obtained via SNMP. Description: It is possible to obtain the list of running processes on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.25.4.2.1.2 An attacker may use this information to gain more knowledge about the target host. Risk factor: None Solution: Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Plugin output: sched init pageout fsflush svc.startd svc.configd syseventd picld kcfd nscd devfsadmd cron rpcbind nfs4cbd nfsmapid sac statd lockd utmpd inetd ttymon nmbd smbd smbd vold mountd nfsd sshd sshd sshd -bash mount automountd automountd syslogd sendmail sendmail fmd snmpd dtlogin sh sh dataserver backupserver httpd dsmc dsmcad smbd smbd xfs sh rpc.ttdbserverd smbd ttymon smbd ex ex perl httpd smbd sas elssrv sshd sshd -csh -csh bash bash smbd smbd smbd sshd sshd -csh httpd smbd httpd smbd sshd sshd -csh httpd smbd -csh java httpd httpd httpd httpd httpd httpd httpd httpd perl httpd httpd httpd httpd httpd httpd httpd imapd imapd httpd sendmail in.ftpd in.ftpd Plugin ID: 10550 SNMP Supported Protocols Detection Synopsis: This plugin reports all the protocol versions successfully negotiated with the remote SNMP agent. Description: Extend the SNMP settings data already gathered by testing for SNMP versions other than the highest negotiated. Risk factor: None Solution: n/a Plugin output: This host supports SNMP version SNMPv1. This host supports SNMP version SNMPv2c. Plugin ID: 40448 SNMP Protocol Version Detection Synopsis: This plugin reports the protocol version negotiated with the remote SNMP agent. Description: By sending an SNMP 'get-next-request', it is possible to determine the protocol version of the remote SNMP agent. Risk factor: None See also: http://en.wikipedia.org/wiki/Simple_Network_Management_Protocol Solution: Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Plugin output: Nessus has negotiated SNMP communications at SNMPv2c. Plugin ID: 35296 SNMP Query Routing Information Disclosure Synopsis: The list of IP routes on the remote host can be obtained via SNMP. Description: It is possible to obtain the routing information on the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.4.21 An attacker may use this information to gain more knowledge about the network topology. Risk factor: None Solution: Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Plugin output: 69.86.246.247/255.255.255.255 127.0.0.1/255.255.255.255 128.59.28.164/255.255.255.255 128.59.29.8/255.255.255.255 137.187.22.50/255.255.255.255 137.187.22.51/255.255.255.255 156.111.0.0/255.255.255.255 156.111.5.0/255.255.255.0 156.111.5.1/255.255.255.255 156.111.5.28/255.255.255.255 156.111.5.54/255.255.255.255 156.111.5.89/255.255.255.255 156.111.5.207/255.255.255.255 156.111.5.255/255.255.255.255 156.111.60.83/255.255.255.255 156.111.60.150/255.255.255.255 156.111.70.150/255.255.255.255 156.111.204.50/255.255.255.255 156.111.255.255/255.255.255.255 156.145.103.24/255.255.255.255 156.145.104.15/255.255.255.255 156.145.104.38/255.255.255.255 156.145.104.42/255.255.255.255 156.145.104.54/255.255.255.255 156.145.104.60/255.255.255.255 156.145.104.67/255.255.255.255 156.145.104.70/255.255.255.255 156.145.104.91/255.255.255.255 156.145.104.95/255.255.255.255 156.145.104.103/255.255.255.255 156.145.104.132/255.255.255.255 156.145.104.136/255.255.255.255 156.145.104.149/255.255.255.255 156.145.104.177/255.255.255.255 156.145.104.229/255.255.255.255 156.145.105.181/255.255.255.255 156.145.109.22/255.255.255.255 156.145.113.37/255.255.255.255 160.39.40.212/255.255.255.255 207.46.12.213/255.255.255.255 224.0.0.0/240.0.0.0 255.255.255.255/255.255.255.255 Plugin ID: 34022 SNMP Query System Information Disclosure Synopsis: The System Information of the remote host can be obtained via SNMP. Description: It is possible to obtain the system information about the remote host by sending SNMP requests with the OID 1.3.6.1.2.1.1.1. An attacker may use this information to gain more knowledge about the target host. Risk factor: None Solution: Disable the SNMP service on the remote host if you do not use it, or filter incoming UDP packets going to this port. Plugin output: System information : sysDescr : SunOS ctsa 5.10 Generic_141414-02 sun4u sysObjectID : 1.3.6.1.4.1.8072.3.2.3 sysUptime : 2d 22h 18m 16s sysContact : "System administrator" sysName : ctsa sysLocation : "System administrators office" sysServices : 72 Plugin ID: 10800 Nessus SNMP Scanner Synopsis: SNMP information is enumerated to learn about other open ports. Description: This plugin runs an SNMP scan against the remote machine to find open ports. See the section 'plugins options' to configure it Risk factor: None Solution: n/a Plugin output: Nessus snmp scanner was able to retrieve the open port list with the community name: public It found 38 open TCP ports and 17 open UDP ports Plugin ID: 14274 Port unknown (16935/tcp) [-/+] Port xdmcp? (177/udp) [-/+] Port rpc-nfs (2049/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 2049 : - program: 100003 (nfs), version: 2 - program: 100003 (nfs), version: 3 - program: 100227 (nfs_acl), version: 2 - program: 100227 (nfs_acl), version: 3 Plugin ID: 11111 RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 2049 : - program: 100003 (nfs), version: 2 - program: 100003 (nfs), version: 3 - program: 100003 (nfs), version: 4 - program: 100227 (nfs_acl), version: 2 program: 100227 (nfs_acl), version: 3 Plugin ID: 11111 Port ftp (21/tcp) [-/+] Solaris FTP Daemon Long Command Cross-Site Request Forgery Synopsis: The remote FTP server has a cross-site request forgery vulnerability. Description: The version of FTP running on the remote host has a cross-site request forgery vulnerability. Long file names are not processed properly, resulting in the execution of arbitrary commands. If a user is logged into the FTP server via web browser, a remote attacker could exploit this by tricking them into requesting a maliciously crafted web page, resulting in the execution of arbitrary FTP commands. Risk factor: Medium CVSS Base Score:4.3 CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N See also: http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0283.html See also: http://securityreason.com/achievement_securityalert/84 Solution: There is no known solution at this time. Plugin ID: 47040 BID: 40320 Other references: OSVDB:64869, Secunia:39856 Anonymous FTP Enabled Synopsis: Anonymous logins are allowed on the remote FTP server. Description: This FTP service allows anonymous logins. Any remote user may connect and authenticate without providing a password or unique credentials. This allows a user to access any files made available on the FTP server. Risk factor: Medium CVSS Base Score:5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution: Disable anonymous FTP if it is not required. Routinely check the FTP server to ensure sensitive content is not available. Plugin output: The contents of the remote FTP root are : total 80 lrwxrwxrwx 1 0 1 7 Dec 31 2009 bin -> usr/bin drwxr-xr-x 2 0 1 512 Jul 13 2004 dev drwxrxr-x 2 0 1 512 Jul 13 2004 etc dr-xr-xr-x 21 anonymou 1 512 Jul 12 2004 pub drwxr-xr-x 5 0 1 512 Jul 12 2004 usr Plugin ID: 10079 CVE: CVE-1999-0497 Other references: OSVDB:69 Service Detection An FTP server is running on this port. Plugin ID: 22964 FTP Supports Clear Text Authentication Synopsis: Authentication credentials might be intercepted. Description: The remote FTP server allows the user's name and password to be transmitted in clear text, which may be intercepted by a network sniffer, or a man-in-the-middle attack. Risk factor: Low CVSS Base Score:2.6 CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N Solution: Switch to SFTP (part of the SSH suite) or FTPS (FTP over SSL/TLS). In the latter case, configure the server such that control connections are encrypted. Plugin output: This FTP server does not support 'AUTH TLS'. Plugin ID: 34324 Other references: CWE:522, CWE:523 FTP Server Detection Synopsis: An FTP server is listening on this port. Description: It is possible to obtain the banner of the remote FTP server by connecting to the remote port. Risk factor: None Solution: N/A Plugin output: The remote FTP banner is : 220 ctsa FTP server ready. Plugin ID: 10092 Port ssh (22/tcp) [-/+] SSH Server Type and Version Information Synopsis: An SSH server is listening on this port. Description: It is possible to obtain information about the remote SSH server by sending an empty authentication request. Risk factor: None Solution: n/a Plugin output: SSH version : SSH-2.0-Sun_SSH_1.1.1 SSH supported authentication : gssapi-keyex,gssapi-with-mic,publickey,password,keyboard-interactive Plugin ID: 10267 Service Detection An SSH server is running on this port. Plugin ID: 22964 Port telnet (23/tcp) Telnet Server Detection [-/+] Synopsis: A Telnet server is listening on the remote port. Description: The remote host is running a Telnet server, a remote terminal server. Risk factor: None Solution: Disable this service if you do not use it. Plugin output: Here is the banner from the remote Telnet server : ----------------------------- snip ------------------------------ login: ------------------------------ snip ----------------------------Plugin ID: 10281 Service Detection A telnet server is running on this port. Plugin ID: 22964 Unencrypted Telnet Server Synopsis: The remote Telnet server transmits traffic in cleartext. Description: The remote host is running a Telnet server over an unencrypted channel. Using Telnet over an unencrypted channel is not recommended as logins, passwords and commands are transferred in cleartext. An attacker may eavesdrop on a Telnet session and obtain credentials or other sensitive information. Use of SSH is prefered nowadays as it protects credentials from eavesdropping and can tunnel additional data streams such as the X11 session. Risk factor: Low CVSS Base Score:2.6 CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N Solution: Disable this service and use SSH instead. Plugin ID: 42263 Port smtp (25/tcp) [-/+] SMTP Server Detection Synopsis: An SMTP server is listening on the remote port. Description: The remote host is running a mail (SMTP) server on this port. Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it. Risk factor: None Solution: Disable this service if you do not use it, or filter incoming traffic to this port. Plugin output: Remote SMTP server banner : 220 ctsa.cpmc.columbia.edu ESMTP Sendmail 8.13.8+Sun/8.13.8; Wed, 6 Oct 2010 21:50:20 -0400 (EDT) 500 5.5.1 Command unrecognized: "GET / HTTP/1.0" 500 5.5.1 Command unrecognized: "" Plugin ID: 10263 Service Detection An SMTP server is running on this port. Plugin ID: 22964 Port remoteware-cl? (3000/tcp) [-/+] Port unknown (30000/tcp) [-/+] Port telnet (3100/tcp) [-/+] Telnet Server Detection Synopsis: A Telnet server is listening on the remote port. Description: The remote host is running a Telnet server, a remote terminal server. Risk factor: None Solution: Disable this service if you do not use it. Plugin output: Here is the banner from the remote Telnet server : ----------------------------- snip ------------------------------ Username: -----------------------------snip -----------------------------Plugin ID: 10281 Unencrypted Telnet Server Synopsis: The remote Telnet server transmits traffic in cleartext. Description: The remote host is running a Telnet server over an unencrypted channel. Using Telnet over an unencrypted channel is not recommended as logins, passwords and commands are transferred in cleartext. An attacker may eavesdrop on a Telnet session and obtain credentials or other sensitive information. Use of SSH is prefered nowadays as it protects credentials from eavesdropping and can tunnel additional data streams such as the X11 session. Risk factor: Low CVSS Base Score:2.6 CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N Solution: Disable this service and use SSH instead. Plugin ID: 42263 Service Detection A telnet server is running on this port. Plugin ID: 22964 Port rpc-fmproduct (32771/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 32771 : - program: 1073741824 (fmproduct), version: 1 Plugin ID: 11111 Port rpc-status (32772/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 32772 : - program: 100024 (status), version: 1 - program: 100133 (nsm_addrand), version: 1 Plugin ID: 11111 Port rpc-rusersd (32773/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 32773 : - program: 100002 (rusersd), version: 2 - program: 100002 (rusersd), version: 3 Plugin ID: 11111 Port rpc-status (32774/udp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 32774 : - program: 100024 (status), version: 1 - program: 100133 (nsm_addrand), version: 1 Plugin ID: 11111 Port rpc-sgi_fam (32776/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 32776 : - program: 391002 (sgi_fam), version: 1 - program: 391002 (sgi_fam), version: 2 Plugin ID: 11111 Port rpc-ttdbserverd (32777/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 32777 : - program: 100083 (ttdbserverd), version: 1 Plugin ID: 11111 Port rpc-mountd (32778/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 32778 : - program: 100005 (mountd), version: 1 - program: 100005 (mountd), version: 2 program: 100005 (mountd), version: 3 Plugin ID: 11111 Port rpc-rstatd (32779/udp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 32779 : - program: 100001 (rstatd), version: 2 - program: 100001 (rstatd), version: 3 program: 100001 (rstatd), version: 4 Plugin ID: 11111 Port rpc-rusersd (32780/udp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 32780 : - program: 100002 (rusersd), version: 2 - program: 100002 (rusersd), version: 3 Plugin ID: 11111 Port rpc-rquotad (32782/udp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 32782 : - program: 100011 (rquotad), version: 1 Plugin ID: 11111 Port rpc-cmsd (32786/udp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 32786 : - program: 100068 (cmsd), version: 2 - program: 100068 (cmsd), version: 3 program: 100068 (cmsd), version: 4 - program: 100068 (cmsd), version: 5 Plugin ID: 11111 Port rpc-mountd (32787/udp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 32787 : - program: 100005 (mountd), version: 1 - program: 100005 (mountd), version: 2 program: 100005 (mountd), version: 3 Plugin ID: 11111 Port unknown (32789/tcp) [-/+] Port unknown (32791/tcp) [-/+] Port unknown (32856/udp) [-/+] Port rpc-nlockmgr (4045/tcp) [-/+] RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on UDP port 4045 : - program: 100021 (nlockmgr), version: 1 - program: 100021 (nlockmgr), version: 2 - program: 100021 (nlockmgr), version: 3 - program: 100021 (nlockmgr), version: 4 Plugin ID: 11111 RPC Services Enumeration Synopsis: An ONC RPC service is running on the remote host. Description: By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services running on the remote port. Using this information, it is possible to connect and bind to each service by sending an RPC request to the remote port. Risk factor: None Solution: n/a Plugin output: The following RPC services are available on TCP port 4045 : - program: 100021 (nlockmgr), version: 1 - program: 100021 (nlockmgr), version: 2 - program: 100021 (nlockmgr), version: 3 - program: 100021 (nlockmgr), version: 4 Plugin ID: 11111 Port cifs (445/tcp) Samba Server Detection [-/+] Synopsis: An SMB server is running on the remote host. Description: The remote host is running Samba, a CIFS/SMB server for Unix. Risk factor: None See also: http://www.samba.org/ Solution: n/a Plugin ID: 25240 Port commplex-link? (5001/tcp) [-/+] Port rlogin (513/tcp) [-/+] rlogin Service Detection Synopsis: The rlogin service is listening on the remote port. Description: The remote host is running the 'rlogin' service. This service is dangerous in the sense that it is not ciphered - that is, everyone can sniff the data that passes between the rlogin client and the rloginserver. This includes logins and passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local network) then it may be possible to bypass authentication. Finally, rlogin is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files. You should disable this service and use ssh instead. Risk factor: Medium CVSS Base Score:5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution: Comment out the 'login' line in /etc/inetd.conf Plugin ID: 10205 CVE: CVE-1999-0651 Other references: OSVDB:193 Port shell? (514/tcp) [-/+] Port unknown (52412/udp) [-/+] Port smtp (587/tcp) [-/+] SMTP Server Detection Synopsis: An SMTP server is listening on the remote port. Description: The remote host is running a mail (SMTP) server on this port. Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it. Risk factor: None Solution: Disable this service if you do not use it, or filter incoming traffic to this port. Plugin output: Remote SMTP server banner : 220 ctsa.cpmc.columbia.edu ESMTP Sendmail 8.13.8+Sun/8.13.8; Wed, 6 Oct 2010 21:50:11 -0400 (EDT) 500 5.5.1 Command unrecognized: "GET / HTTP/1.0" 500 5.5.1 Command unrecognized: "" Plugin ID: 10263 Service Detection An SMTP server is running on this port. Plugin ID: 22964 Port unknown (60405/tcp) [-/+] Port xfs (7100/tcp) [-/+] X Font Service Detection Synopsis: An X font service is listening on the remote host. Description: The remote service is an X Window Font Service (xfs) daemon, which serves font files to clients. Risk factor: None See also: http://www.x.org/docs/FSProtocol/fsproto.pdf See also: http://en.wikipedia.org/wiki/X_Font_Server Solution: Limit incoming traffic to this port if desired or disable the service as the use of server-supplied fonts is currently deprecated. Plugin output: Nessus was able to gather the following information from the remote X Font Server : - Protocol : 2.0 - Alternate servers : none - Max request size : 65536 bytes - Vendor release : 6000 - Vendor string : X Consortium - Available fonts (up to 15) : --courier-bold-o-normal--0-0-00-m-0-iso8859-1 --courier-bold-r-normal--0-0-0-0-m-0-iso8859-1 -courier-medium-o-normal--0-0-0-0-m-0-iso8859-1 --courier-medium-rnormal--0-0-0-0-m-0-iso8859-1 --symbol-medium-r-normal--0-0-0-0-p-0-symbol --symbol-medium-r-normal--0-0-0-0-p-0-sun-fontspecific -itccourier-bold-o-normal--0-0-0-0-m-0-iso8859-1 -itc-courier-bold-r-normal-0-0-0-0-m-0-iso8859-1 -itc-courier-medium-o-normal--0-0-0-0-m-0iso8859-1 -itc-courier-medium-r-normal--0-0-0-0-m-0-iso8859-1 linotype-helvetica-bold-o-normal--0-0-0-0-p-0-iso8859-1 -linotypehelvetica-bold-o-normal-sans-0-0-0-0-p-0-iso8859-1 -linotype-helveticabold-r-normal--0-0-0-0-p-0-iso8859-1 -linotype-helvetica-bold-r-normalsans-0-0-0-0-p-0-iso8859-1 -linotype-helvetica-medium-o-normal--0-0-00-p-0-iso8859-1 Plugin ID: 26971 Port finger (79/tcp) [-/+] Finger Recursive Request Arbitrary Site Redirection Synopsis: It is possible to use the remote host to perform third-party host scans. Description: The remote finger service accepts redirect requests. That is, users can perform requests like : finger user@host@victim This allows an attacker to use this computer as a relay to gather information on a third-party network. In addition, this type of syntax can be used to create a denial of service condition on the remote host. Risk factor: Medium CVSS Base Score:5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution: Disable the remote finger daemon (comment out the 'finger' line in /etc/inetd.conf and restart the inetd process) or upgrade it to a more secure one. Plugin ID: 10073 CVE: CVE-1999-0105, CVE-1999-0106 Other references: OSVDB:64, OSVDB:5769 Finger Service Remote Information Disclosure Synopsis: It is possible to obtain information about the remote host. Description: The remote host is running the 'finger' service. The purpose of this service is to show who is currently logged into the remote system, and to give information about the users of the remote system. It provides useful information to attackers, since it allows them to gain usernames, determine how used a machine is, and see when each user logged in for the last time. Risk factor: Medium CVSS Base Score:5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution: Comment out the 'finger' line in /etc/inetd.conf and restart the inetd process Plugin output: Here is the output we obtained for 'root' : Login Name TTY Idle When Where root Super-User pts/1 <Oct 6 14:21> Plugin ID: 10068 CVE: CVE-1999-0612 Other references: OSVDB:11451 Service Detection A finger daemon is running on this port. Plugin ID: 22964 Port www (80/tcp) [-/+] Multiple Web Server printenv CGI Information Disclosure Synopsis: The remote web server contains a CGI script that discloses information. Description: The remote web server contains the 'test-cgi' test script, which is included by default with some web servers. The printenv CGI returns its environment variables. This gives an attacker information like the installation directory, the server IP address (which is interesting if NAT is implemented), the server administrator's e-mail address, the server and modules versions, the shell environment variables... Risk factor: Medium CVSS Base Score:5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution: Remove printenv from /cgi-bin. Plugin output: The CGI was found under : http://ctsa.cpmc.columbia.edu/cgibin/printenv Plugin ID: 10188 Other references: OSVDB:11666 Service Detection A web server is running on this port. Plugin ID: 22964 Port ajp13 (8009/tcp) AJP Connector Detection Synopsis: There is an AJP connector listening on the remote host. [-/+] Description: The remote host is running an AJP (Apache JServ Protocol) connector, a service by which a standalone web server such as Apache communicates over TCP with a Java servlet container such as Tomcat. Risk factor: None See also: http://tomcat.apache.org/connectors-doc/ See also: http://tomcat.apache.org/connectors-doc/ajp/ajpv13a.html Solution: n/a Plugin output: The connector listing on this port supports the ajp13 protocol. Plugin ID: 21186 Port www (8080/tcp) [-/+] Service Detection A web server is running on this port. Plugin ID: 22964 Port www (901/tcp) [-/+] Samba Web Administration Tool (SWAT) Detection Synopsis: The remote host is running a web server for Samba administration. Description: The remote host is running SWAT, the Samba Web Administration Tool. SWAT is a web-based configuration tool for Samba administration that also allows for network-wide MS Windows network password management. Risk factor: None See also: http://www.samba.org/samba/docs/man/Samba-HOWTOCollection/SWAT.html Solution: Either disable SWAT or limit access to authorized users and ensure that it is set up with stunnel to encrypt network traffic. Plugin ID: 10273 Service Detection A SWAT server is running on this port. Plugin ID: 22964 Service Detection A web server is running on this port. Plugin ID: 22964 Port imap (993/tcp) [-/+] IMAP Service Banner Retrieval Synopsis: An IMAP server is running on the remote host. Description: An IMAP (Internet Message Access Protocol) server is installed and running on the remote host. Risk factor: None Solution: n/a Plugin output: The remote imap server banner is : * OK [CAPABILITY IMAP4REV1 LITERAL+ SASL-IR LOGIN-REFERRALS AUTH=PLAIN AUTH=LOGIN] ctsa IMAP4rev1 2006e.378 at Wed, 6 Oct 2010 21:50:09 -0400 (EDT) Plugin ID: 11414 Service Detection A TLSv1 server answered on this port. Plugin ID: 22964 Service Detection An IMAP server is running on this port through TLSv1. Plugin ID: 22964 [^] Back to 156.111.5.207