OpenVas Report
OpenVas Report
OpenVas Report
Summary
This document reports on the results of an automatic security scan. All dates are dis-
played using the timezone Coordinated Universal Time, which is abbreviated UTC. The
task was Khadijah Watkins. The scan started at Tue Apr 19 02:06:36 2022 UTC and ended
at Tue Apr 19 02:11:19 2022 UTC. The report rst summarises the results found. Then, for
each host, the report describes every issue found. Please consider the advice given in each
description, in order to rectify the issue.
Contents
1 Result Overview 2
2 Results per Host 2
2.1 10.10.1.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 10.10.1.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1
2 RESULTS PER HOST 2
1 Result Overview
This report contains all 7 results selected by the ltering described above. Before ltering there
were 43 results.
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-010.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2016
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012 R2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
Vulnerability Insight
Multiple aws exist due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server
handles certain requests.
References
cve: CVE-2017-0143
cve: CVE-2017-0144
cve: CVE-2017-0145
cve: CVE-2017-0146
cve: CVE-2017-0147
cve: CVE-2017-0148
bid: 96703
bid: 96704
bid: 96705
bid: 96707
bid: 96709
bid: 96706
url: https://support.microsoft.com/en-in/kb/4013078
url: https://technet.microsoft.com/library/security/MS17-010
url: https://github.com/rapid7/metasploit-framework/pull/8167/files
. . . continues on next page . . .
2 RESULTS PER HOST 4
[ return to 10.10.1.2 ]
Summary
OS End Of Life Detection.
The Operating System on the remote host has reached the end of life and should not be used
anymore.
Solution:
Solution type: Mitigation
Upgrade the Operating System on the remote host to a version which is still supported and
receiving security updates by the vendor.
[ return to 10.10.1.2 ]
2 RESULTS PER HOST 5
2.2 10.10.1.3
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-010.
Impact
Successful exploitation will allow remote attackers to gain the ability to execute code on the
target server, also could lead to information disclosure from the server.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2016
- Microsoft Windows 8.1 x32/x64
- Microsoft Windows Server 2012 R2
- Microsoft Windows 7 x32/x64 Service Pack 1
- Microsoft Windows Vista x32/x64 Service Pack 2
- Microsoft Windows Server 2008 R2 x64 Service Pack 1
- Microsoft Windows Server 2008 x32/x64 Service Pack 2
Vulnerability Insight
Multiple aws exist due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server
handles certain requests.
References
cve: CVE-2017-0143
cve: CVE-2017-0144
cve: CVE-2017-0145
cve: CVE-2017-0146
cve: CVE-2017-0147
cve: CVE-2017-0148
bid: 96703
bid: 96704
bid: 96705
bid: 96707
bid: 96709
bid: 96706
url: https://support.microsoft.com/en-in/kb/4013078
url: https://technet.microsoft.com/library/security/MS17-010
url: https://github.com/rapid7/metasploit-framework/pull/8167/files
cert-bund: CB-K17/0435
dfn-cert: DFN-CERT-2017-0448
Summary
This host is missing a critical security update according to Microsoft Bulletin MS17-010.
Impact
Successful exploitation will allow remote attackers to gain the ability to execute code on the
target server, also could lead to information disclosure from the server.
Solution:
Solution type: VendorFix
The vendor has released updates. Please see the references for more information.
Aected Software/OS
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2016
. . . continues on next page . . .
2 RESULTS PER HOST 7
Vulnerability Insight
Multiple aws exist due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server
handles certain requests.
References
cve: CVE-2017-0143
cve: CVE-2017-0144
cve: CVE-2017-0145
cve: CVE-2017-0146
cve: CVE-2017-0147
cve: CVE-2017-0148
bid: 96703
bid: 96704
bid: 96705
bid: 96707
bid: 96709
bid: 96706
url: https://support.microsoft.com/en-in/kb/4013078
url: https://technet.microsoft.com/library/security/MS17-010
url: https://github.com/rapid7/metasploit-framework/pull/8167/files
cert-bund: CB-K17/0435
dfn-cert: DFN-CERT-2017-0448
[ return to 10.10.1.3 ]
Summary
OS End Of Life Detection.
The Operating System on the remote host has reached the end of life and should not be used
anymore.
Solution:
Solution type: Mitigation
Upgrade the Operating System on the remote host to a version which is still supported and
receiving security updates by the vendor.
[ return to 10.10.1.3 ]
Summary
Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC ser-
vices running on the remote host can be enumerated by connecting on port 135 and doing the
appropriate queries.
Impact
An attacker may use this fact to gain more knowledge about the remote host.
Solution:
Solution type: Mitigation
Filter incoming trac to this ports.
[ return to 10.10.1.3 ]
Summary
The remote host implements TCP timestamps and therefore allows to compute the uptime.
Impact
A side eect of this feature is that the uptime of the remote host can sometimes be computed.
Solution:
Solution type: Mitigation
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
/etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
. . . continues on next page . . .
2 RESULTS PER HOST 11
Aected Software/OS
TCP implementations that implement RFC1323/RFC7323.
Vulnerability Insight
The remote host implements TCP timestamps, as dened by RFC1323/RFC7323.
References
url: http://www.ietf.org/rfc/rfc1323.txt
url: http://www.ietf.org/rfc/rfc7323.txt
url: https://web.archive.org/web/20151213072445/http://www.microsoft.com/en-us/d
,→ownload/details.aspx?id=9152
[ return to 10.10.1.3 ]