Confidential Information |
The following report contains confidential information, do not distribute, email, fax or transfer via any electronic mechanism unless it has been approved by our security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is ground for termination. |
Table of Contents
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Executive Summary | ![]() |
|
|
Vulnerability Summary | ![]() |
![]() |
Audits
Total Vulnerabilities By Risk
Level The following graph illustrates the total number of vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By
Accounts Audit The following graph illustrates the total number of Accounts vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By CGI
Scripts Audit The following graph illustrates the total number of CGI Scripts vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By CHAM
Audit The following graph illustrates the total number of CHAM vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By
Database Audit The following graph illustrates the total number of Database vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By DNS
Services Audit The following graph illustrates the total number of DNS Services vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By DoS
Audit The following graph illustrates the total number of DoS vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By FTP
Servers Audit The following graph illustrates the total number of FTP Servers vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By IP
Services Audit The following graph illustrates the total number of IP Services vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By Mail
Servers Audit The following graph illustrates the total number of Mail Servers vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By
Miscellaneous Audit The following graph illustrates the total number of Miscellaneous vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By NetBIOS
Audit The following graph illustrates the total number of NetBIOS vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By
Registry Audit The following graph illustrates the total number of Registry vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By Remote
Access Audit The following graph illustrates the total number of Remote Access vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By Rpc
Services Audit The following graph illustrates the total number of Rpc Services vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By Service
Control Audit The following graph illustrates the total number of Service Control vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By SNMP
Servers Audit The following graph illustrates the total number of SNMP Servers vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By SSH
Servers Audit The following graph illustrates the total number of SSH Servers vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By Web
Servers Audit The following graph illustrates the total number of Web Servers vulnerabilities across all machines divided by risk level. |
|
Total Vulnerabilities By
Wireless Audit The following graph illustrates the total number of Wireless vulnerabilities across all machines divided by risk level. |
|
Address 010.001.001.108 | ![]() |
General: 010.001.001.108
Address: 10.1.1.108
No More Details Available
Report Date: 11/20/03 03:52:20 PM
No More Details Available
Domain Name: LTREE108
No More Details Available
Ping Response: Host Responded
No More Details Available
Average Ping Response: 60 ms
No More Details Available
Time To Live: 128
No More Details Available
Traceroute: 10.1.1.108
No More Details Available
Audits: 010.001.001.108
CGI Scripts: TCP:80 - CGI - fpcount.exe
Risk Level: High
Description: A buffer overflow vulnerability in older versions of fpcount.exe, can be be remotely exploited to execute arbitrary commands.
How To Fix:
Fpcount.exe is not needed to operate frontpage. Remove the file from your system to mitigate this vulnerability.
URL1: Microsoft Frontpage (http://microsoft.com/frontpage/)
CVE: CAN-1999-1376
NetBIOS: Null Session
Risk Level: High
Description: A Null Session occurs when an attacker sends a blank username and blank password to try to connect to the IPC$ (Inter Process Communication) pipe. By creating a Null session to IPC$ an attacker is then able to gain a list of user names, shares, etc...
Note: If you have run this Retina scan with Administrator level access to your network then you will always be able to create a null session and therefore this is a false positive and not a vulnerability.
How To Fix:
Add the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\LSA Name: RestrictAnonymous Type: REG_DWORD Value: 1.
CVE: CVE-2000-1200
BugtraqID: 494
Web Servers: TCP:80 - IIS 5.0 IPP ISAPI Host overflow
Risk Level: High
Description: Due to an unchecked buffer in msw3prt.dll, a maliciously crafted HTTP .printer request containing approx 420 bytes in the 'Host:' field will allow the execution of arbitrary code on unpatched Windows 2000 IIS 5.0 web servers.
How To Fix:
A patch is available from Microsoft to fix this vulnerability. We also recommend removing the .printer ISAPI filter if it is not needed.
URL1: Microsoft - IPP Hotfix (http://www.microsoft.com/Downloads/Release.asp?ReleaseID=29321)
URL2: eEye Digital Security Advisory (http://www.eeye.com/html/Research/Advisories/AD20010501.html)
CVE: CVE-2001-0241
BugtraqID: 2674
Web Servers: TCP:80 - IIS4-5 escape characters decode vulnerability
Risk Level: High
Description: Due to a flaw in the handling of CGI filename program requests, it is possible for a remote user to execute arbitrary commands on an Internet Information Server or Personal Web Server host. The problem exists in the decoding of escape characters in the URI of the HTTP request itself.
How To Fix:
Microsoft has released a patch to eliminate this flaw.
URL1: Microsoft Patch. (http://support.microsoft.com/support/kb/articles/Q295/5/34.ASP)
CVE: CVE-2001-0333
BugtraqID: 2708
Web Servers: TCP:80 - IIS45 IDA remote system overflow
Risk Level: High
Description: This vulnerability allows any malicous attacker to gain remote system level access on unpatched systems. This is the same attack that was used for CodeRed so its important to patch immediately.
How To Fix:
Microsoft has released a hotfix for this vulnerability.
URL1: Microsoft Advisory. (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS01-033.asp)
URL2: eEye Digital Security Advisory (http://www.eeye.com/html/Research/Advisories/AD20010618.html)
URL3: eEye Analysis of CodeRed (http://www.eeye.com/html/Research/Advisories/AL20010717.html)
CVE: CVE-2001-0500
BugtraqID: 2880
Web Servers: TCP:80 - NT IIS Unicode Vulnerability
Risk Level: High
Description: Microsoft IIS (Internet Information Services) 4.0 and 5.0 contain a vulnerability in how they parse file requests that contain Unicode characters. It is possible for an attacker to remotely execute commands against vulnerable servers with an access level of IUSR_MACHINE. This is the vulnerability the nimda wormed used to propagate.
How To Fix:
Install the patch provided by Microsoft.
URL1: Microsoft Security Bulletin (http://www.microsoft.com/technet/security/bulletin/MS00-078.asp)
CVE: CVE-2000-0884
BugtraqID: 1806
Accounts: Administrator - Password Does Not Expire
Risk Level: Medium
Description: If a users password does not expire you allow a remote attacker endless amount of time to try to figure out your users password. It is recommended that you make all users passwords expire unless the user account is used for a system service.
How To Fix:
Remove the password never expires option from the user account.
1. Open User Manager.
2. Select the user from the list.
3. Select Properties from the User menu.
4. Uncheck "Password Never Expires."
5. Click "Ok".
CVE: CAN-1999-0535
Accounts: IUSR_VM2KSERVER - Password Does Not Expire
Risk Level: Medium
Description: If a users password does not expire you allow a remote attacker endless amount of time to try to figure out your users password. It is recommended that you make all users passwords expire unless the user account is used for a system service.
How To Fix:
Remove the password never expires option from the user account.
1. Open User Manager.
2. Select the user from the list.
3. Select Properties from the User menu.
4. Uncheck "Password Never Expires."
5. Click "Ok".
CVE: CAN-1999-0535
Accounts: IWAM_VM2KSERVER - Password Does Not Expire
Risk Level: Medium
Description: If a users password does not expire you allow a remote attacker endless amount of time to try to figure out your users password. It is recommended that you make all users passwords expire unless the user account is used for a system service.
How To Fix:
Remove the password never expires option from the user account.
1. Open User Manager.
2. Select the user from the list.
3. Select Properties from the User menu.
4. Uncheck "Password Never Expires."
5. Click "Ok".
CVE: CAN-1999-0535
Accounts: TsInternetUser - Password Does Not Expire
Risk Level: Medium
Description: If a users password does not expire you allow a remote attacker endless amount of time to try to figure out your users password. It is recommended that you make all users passwords expire unless the user account is used for a system service.
How To Fix:
Remove the password never expires option from the user account.
1. Open User Manager.
2. Select the user from the list.
3. Select Properties from the User menu.
4. Uncheck "Password Never Expires."
5. Click "Ok".
CVE: CAN-1999-0535
Accounts: Max Password Age
Risk Level: Medium
Description: The maximum password age is the maximum number of days until a user's account password expires. It is recommended that users change their password once a month.
How To Fix:
For Windows NT 4.0:
Set the maximum password age to 30 days.
1. Open User Manager.
2. Select Account from the Policies menu.
3. Click Expires In.
4. Enter the maximum days (Recommended 30 or less).
For Windows 2000:
Open Administrative tools, local security policy.
Now navigate to Account Policy, Password Policy.
From the menu on the right you can now reconfigure your settings.
CVE: CAN-1999-0535
Accounts: Min Password Length
Risk Level: Medium
Description: The minimum password length is the least amount of characters a user account password can be. It is recommended that account passwords are greater than 10 characters.
How To Fix:
Set the minimum password length to 10 characters.
1. Open User Manager.
2. Select Account from the Policies menu.
3. Click At Least.
4. Enter the minimum password length (recommended is 10 characters or more).
CVE: CAN-1999-0535
Web Servers: TCP:80 - IDA Real Path Attack
Risk Level: Medium
Description: By sending a malformed request to the .IDA ISAPI filter, it is possible for an attacker to remotely learn where your web server files are stored. I.E. http://www.example.com/invalidfilename.ida will return c:\inetpub\wwwroot\invalidfilename.ida not found.
How To Fix:
Open up Internet Services Manager.
Right click properties for the web you want to protect.
Click the "Home Directory" tab.
Click the "Configuration" button.
Select the .IDA ISAPI filter and click the "Edit" button.
Now check the box "Check that file exists."
CVE: GENERIC-MAP-NOMATCH
Web Servers: TCP:80 - IDQ Real Path Attack
Risk Level: Medium
Description: By sending a malformed request to the .IDQ ISAPI filter, it is possible for an attacker to remotely learn where your web server files are stored. I.E. http://www.example.com/invalidfilename.idq will return c:\inetpub\wwwroot\invalidfilename.idq not found.
How To Fix:
Open up Internet Services Manager.
Right click properties for the web you want to protect.
Click the "Home Directory" tab.
Click the "Configuration" button.
Select the .IDQ ISAPI filter and click the "Edit" button.
Now check the box "Check that file exists."
CVE: GENERIC-MAP-NOMATCH
Web Servers: TCP:80 - IIS - ISM Source Fragment Disclosure
Risk Level: Medium
Description: By sending a carefully crafted URL to IIS4 and II5 an attacker can view various fragments of asp files. This technique can be used to discover database username and passwords.
How To Fix:
Microsoft has made patches available that will correct this problem.
URL1: Microsoft Advisory (http://www.microsoft.com/technet/security/bulletin/ms00-044.asp)
CVE: CVE-2000-0630
BugtraqID: 1488
Web Servers: TCP:80 - IIS5 Translate Source Disclosure
Risk Level: Medium
Description: An attacker can view the source code of your ASP files by sending a carefully crafted URL containing the Translate: header field. This can lead to an attacker learning about passwords and various other data that can lead to total system compromise.
How To Fix:
Microsoft has released a patch for this problem.
URL1: Microsoft patch Q256888_W2K_SP1_x86_en (http://support.microsoft.com/default.aspx?scid=KB;EN-US;Q256888&)
CVE: CVE-2000-0778
BugtraqID: 1578
Accounts: IUSR_VM2KSERVER - Cannot Change Password
Risk Level: Low
Description: It is recommended that a machine be set up so that a user has the ability to change their password; otherwise password changes will occur less frequently. However, if this account is one that is used by a system service the ability to change passwords is not something that is required.
How To Fix:
Allow the user to change their password by doing the following:
1. Open User Manager.
2. Select the user from the list box.
3. Select properties from the User menu.
4. Uncheck "User Cannot Change Password."
5. Click "OK".
CVE: GENERIC-MAP-NOMATCH
Accounts: IWAM_VM2KSERVER - Cannot Change Password
Risk Level: Low
Description: It is recommended that a machine be set up so that a user has the ability to change their password; otherwise password changes will occur less frequently. However, if this account is one that is used by a system service the ability to change passwords is not something that is required.
How To Fix:
Allow the user to change their password by doing the following:
1. Open User Manager.
2. Select the user from the list box.
3. Select properties from the User menu.
4. Uncheck "User Cannot Change Password."
5. Click "OK".
CVE: GENERIC-MAP-NOMATCH
Accounts: TsInternetUser - Cannot Change Password
Risk Level: Low
Description: It is recommended that a machine be set up so that a user has the ability to change their password; otherwise password changes will occur less frequently. However, if this account is one that is used by a system service the ability to change passwords is not something that is required.
How To Fix:
Allow the user to change their password by doing the following:
1. Open User Manager.
2. Select the user from the list box.
3. Select properties from the User menu.
4. Uncheck "User Cannot Change Password."
5. Click "OK".
CVE: GENERIC-MAP-NOMATCH
Accounts: Min Password Age
Risk Level: Low
Description: The minimum password age is the least amount of days before a user can change their password again. If there is no minimum password age set user passwords can be changed too often and users could begin to forget passwords or start reusing old passwords.
How To Fix:
For Windows NT 4.0:
Set the minimum password age to 2 days.
1. Open User Manager.
2. Select Account from the Policies menu.
3. Click Allow Changes In.
4. Enter the minimum days (Recommended 2 or less).
For Windows 2000: For Windows 2000: Open Administrative tools, local security policy.
Now navigate to Account Policy, Password Policy.
From the menu on the right you can now reconfigure your settings.
CVE: CAN-1999-0535
Accounts: Password History
Risk Level: Low
Description: Password History is the number of passwords Windows NT will remember so that users cannot use the same password twice. It is recommended that you set the history length to 4.
How To Fix:
Set the Password History to 4.
1. Open User Manager.
2. Select Account from the Policies menu.
3. Click "Remember Passwords".
4. Enter the amount (Recommended 4 or greater).
CVE: CAN-1999-0535
Accounts: TsInternetUser - User Never Logged On
Risk Level: Information
Description: It is suggested that you review this user account. If it is not needed or was not created by an administrator of your network, it is suggested that you disable or delete it.
How To Fix:
To delete the account:
1. Open User Manager
2. Select the account to delete
3. Press the "Delete" key
4. Click "Ok"
To Disable the account:
1. Open User Manager
2. Select the account to disable
3. Select Properties from the User menu
4. Check "Account Disabled"
5. Click "Ok"
CVE: GENERIC-MAP-NOMATCH
Registry: No Remote Registry Access Available
Risk Level: Information
Description: This host does not allow remote registry access. This could be due to a lack of administrative rights on the host, or the remote registry access is not available.
Retina relies on this remote access for many crucial audits.
How To Fix:
Ensure the remote system has remote registry capabilities on and that you have administrative rights on the system.
Machine: 010.001.001.108
OS Detected: Windows 2000
No More Details Available
Remote Date: 7/19/2001
No More Details Available
Remote MAC: 00-50-56-40-42-3F
No More Details Available
Netbios Name: LTREE108
No More Details Available
Netbios Workgroup: WORKGROUP
No More Details Available
Remote Time: 9:8:53
No More Details Available
Closed Ports: 1904
No More Details Available
Open Ports: 8
No More Details Available
Ports: 010.001.001.108
80: WWW-HTTP - World Wide Web HTTP (Hyper Text Transfer Protocol)
Detected Protocol: HTTP
Server Path: c:\inetpub\wwwroot\
Port State: Open
Version: MICROSOFT-IIS/5.0
135: RPC-LOCATOR - RPC (Remote Procedure Call) Location Service
Port State: Open
139: NETBIOS-SSN - NETBIOS Session Service
Port State: Open
443: HTTPS - HTTPS (Hyper Text Transfer Protocol Secure) - SSL (Secure Socket Layer)
Port State: Open
445: MICROSOFT-DS - Microsoft-DS
Port State: Open
1025: LISTEN - listen
Port State: Open
1026: NTERM - nterm
Port State: Open
1433: MS-SQL-S - Microsoft-SQL-Server
Port State: Open
Services: 010.001.001.108
Browser: Computer Browser
Browser (Computer Browser) maintains an up-to-date list of computers on your network and supplied the list to requesting programs.
LanmanServer: Server
Provides RPC support and file, print, and named pipe sharing.
LanmanWorkstation: Workstation
Provides network connections and communications.
LicenseService: License Logging Service
License Logging Service.
Netlogon: Net Logon
Supports pass-through authentication of account logon events for computers in a domain.
RpcSs: Remote Procedure Call (RPC)
(RPC) Remote Procedure Call. Provides the endpoint mapper and other miscellaneous RPC services.
Spooler: Print Spooler
Print Spooler. Loads files to memory for later printing.
SQL Server:
No More Details Available
Shares: 010.001.001.108
ADMIN$: Remote Admin
Default Administration share. The admin$ share is a mapping to \winnt\system32. An attacker could use access to this share to remotely run l0pht crack against your server to find out your passwords.
C$: Default share
This is a default share created when the server first boots. It is a mapping to the root of your C drive.
IPC$: Remote IPC
This is a default share created when the server first boots. Responsible for Inter Process Communications.
Users: 010.001.001.108
Administrator: Built-in account for administering the computer/domain
Last logon: Thu Jul 19 06:27:59 2001
Last Logoff: unknown
Password Age: 262 days
Expires: never
Logon Server: \\*
Max storage: unlimited
Number of Logons: 23
Privilege: Administrator
Password expired: no
RID: 500
Bad PW Count: 2
Country Code: 0
Guest: Built-in account for guest access to the computer/domain
Account Disabled: True
Last logon: never
Last Logoff: unknown
Expires: never
Logon Server: \\*
Max storage: unlimited
Number of Logons: 0
Privilege: Guest
Password expired: no
RID: 501
Bad PW Count: 2
Country Code: 0
IUSR_VM2KSERVER: Built-in account for anonymous access to Internet Information Services
Full Name: Internet Guest Account
Last logon: Thu Jul 19 10:08:27 2001
Last Logoff: unknown
Password Age: 325 days
Expires: never
Logon Server: \\*
Max storage: unlimited
Number of Logons: 0
Privilege: Guest
Password expired: no
RID: 1001
Bad PW Count: 0
Country Code: 0
IWAM_VM2KSERVER: Built-in account for Internet Information Services to start out of process applications
Full Name: Launch IIS Process Account
Last logon: Thu Jul 19 10:08:53 2001
Last Logoff: unknown
Password Age: 325 days
Expires: never
Logon Server: \\*
Max storage: unlimited
Number of Logons: 16
Privilege: Guest
Password expired: no
RID: 1002
Bad PW Count: 0
Country Code: 0
TsInternetUser: This user account is used by Terminal Services.
Full Name: TsInternetUser
Last logon: never
Last Logoff: unknown
Password Age: 325 days
Expires: never
Logon Server: \\*
Max storage: unlimited
Number of Logons: 0
Privilege: Guest
Password expired: no
RID: 1000
Bad PW Count: 3
Country Code: 0
Glossary | ![]() |
DoS Attack: A Denial of Service (DoS) attack is a remote attack against a servers TCP/IP stack or services. DoS attacks can saturate a servers bandwidth, saturate all available connections for a particular service, or even crash a server.
Exploit: A script or program that takes advantage of vulnerabilities in services or programs to allow an attacker to gain unauthorized or elevated system access.
Host: A node on a network. Usually refers to a computer or device on a network which both initiates and accepts network connections.
IP Address: The 32-bit address defined by the Internet Protocol in STD 5, RFC 791. It is usually represented in dotted decimal notation. Any device connected to the Internet that used TCP/IP is assigned an IP Address. An IP Address can be likened to a home address in that no two are alike.
Netbios: Network Basic Input Output System. The standard interface to networks on IBM PC and compatible networks.
Ping: A program used to test reachability of destination nodes by sending them an ICMP echo request and waiting for a reply.
Port: A port in the network sense is the pathway that a computer uses to transmit and receive data. As an example, Web Servers typically listen for requests on port 80.
Registry: The internal system configuration that a user can customize to alter his computing environment on the Microsoft Windows Platform. The registry is organized in a hierarchical structure of subtrees and their respective keys, subkeys, and values that apply to those keys and subkeys
Service: A service is a program running on a remote machine that in one way or another provides a service to users. For example, when you visit a website the remote server displays a web page via its web server service.
Share: A folder, set of files, or even a hard drive partition set up on a machine to allow access to other users. Shares are frequently set up with incorrect file permissions which could allow an attacker to gain access to this data.
Sniffer: frequently attackers will place a sniffer program on a compromised machine. The sole purpose of a sniffer is to collect data being transmitted on the network in clear-text including usernames and passwords.
Subnet: A portion of a network, which may be a physically independent network segment, which shares a network address with other portions of the network and is distinguished by a subnet number.
Vulnerability: A weakness or a flaw in a program or service that can allow an attacker to gain unauthorized or elevated system access.