*

Nessus:結果ログhtml

公開日: : Ubuntu

Nessus Scan Report

Nessus Report

Nessus Scan Report

06/Dec/2014:23:02:40

Nessus Home: Commercial use of the report is prohibited

Any time Nessus is used in a commercial environment you MUST maintain an active subscription to the Nessus Feed in order to be compliant with our license agreement.http://www.tenable.com/products/nessus

Table Of Contents

Hosts Summary (Executive)
192.168.20.20
Vulnerabilities By Host
192.168.20.20
Vulnerabilities By Plugin
70658 (1) - SSH Server CBC Mode Ciphers Enabled
71049 (1) - SSH Weak MAC Algorithms Enabled
11219 (2) - Nessus SYN scanner
10114 (1) - ICMP Timestamp Request Remote Date Disclosure
10267 (1) - SSH Server Type and Version Information
10287 (1) - Traceroute Information
10719 (1) - MySQL Server Detection
10881 (1) - SSH Protocol Versions Supported
11153 (1) - Service Detection (HELP Request)
19506 (1) - Nessus Scan Information
22964 (1) - Service Detection
25220 (1) - TCP/IP Timestamps Supported
35716 (1) - Ethernet Card Manufacturer Detection
39520 (1) - Backported Security Patch Detection (SSH)
45590 (1) - Common Platform Enumeration (CPE)
70657 (1) - SSH Algorithms and Languages Supported

Hosts Summary (Executive)

[-] Collapse All
[+] Expand All

192.168.20.20

Summary

Critical High Medium Low Info Total
0 0 0 2 14 16

Details

Severity Plugin Id Name
Low (2.6) 70658 SSH Server CBC Mode Ciphers Enabled
Low (2.6) 71049 SSH Weak MAC Algorithms Enabled
Info 10114 ICMP Timestamp Request Remote Date Disclosure
Info 10267 SSH Server Type and Version Information
Info 10287 Traceroute Information
Info 10719 MySQL Server Detection
Info 10881 SSH Protocol Versions Supported
Info 11153 Service Detection (HELP Request)
Info 11219 Nessus SYN scanner
Info 19506 Nessus Scan Information
Info 22964 Service Detection
Info 25220 TCP/IP Timestamps Supported
Info 35716 Ethernet Card Manufacturer Detection
Info 39520 Backported Security Patch Detection (SSH)
Info 45590 Common Platform Enumeration (CPE)
Info 70657 SSH Algorithms and Languages Supported

Vulnerabilities By Host

[-] Collapse All
[+] Expand All

192.168.20.20

Scan Information

Start time: Sat Dec 6 22:58:55 2014
End time: Sat Dec 6 23:02:39 2014

Host Information

IP: 192.168.20.20
MAC Address: c8:60:00:85:d1:7c

Results Summary

Critical High Medium Low Info Total
0 0 0 2 15 17

Results Details

0/icmp

10114 - ICMP Timestamp Request Remote Date Disclosure [-/+]

0/tcp

25220 - TCP/IP Timestamps Supported [-/+]

35716 - Ethernet Card Manufacturer Detection [-/+]

45590 - Common Platform Enumeration (CPE) [-/+]

19506 - Nessus Scan Information [-/+]

0/udp

10287 - Traceroute Information [-/+]

22/tcp

71049 - SSH Weak MAC Algorithms Enabled [-/+]

70658 - SSH Server CBC Mode Ciphers Enabled [-/+]

11219 - Nessus SYN scanner [-/+]

22964 - Service Detection [-/+]

10267 - SSH Server Type and Version Information [-/+]

10881 - SSH Protocol Versions Supported [-/+]

70657 - SSH Algorithms and Languages Supported [-/+]

39520 - Backported Security Patch Detection (SSH) [-/+]

3306/tcp

11219 - Nessus SYN scanner [-/+]

11153 - Service Detection (HELP Request) [-/+]

10719 - MySQL Server Detection [-/+]

Vulnerabilities By Plugin

[-] Collapse All
[+] Expand All

70658 (1) - SSH Server CBC Mode Ciphers Enabled

Synopsis

The SSH server is configured to use Cipher Block Chaining.

Description

The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.

Solution

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

Risk Factor

Low

CVSS Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVSS Temporal Score

2.3 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

References

BID 32319
CVE CVE-2008-5161
XREF OSVDB:50035
XREF OSVDB:50036
XREF CERT:958563
XREF CWE:200

Plugin Information:

Publication date: 2013/10/28, Modification date: 2014/01/28

Hosts

192.168.20.20 (tcp/22)


The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

71049 (1) - SSH Weak MAC Algorithms Enabled

Synopsis

SSH is configured to allow MD5 and 96-bit MAC algorithms.

Description

The SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak.

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.

Solution

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

Risk Factor

Low

CVSS Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

Plugin Information:

Publication date: 2013/11/22, Modification date: 2014/07/08

Hosts

192.168.20.20 (tcp/22)


The following client-to-server Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

11219 (2) - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information:

Publication date: 2009/02/04, Modification date: 2014/01/23

Hosts

192.168.20.20 (tcp/22)

Port 22/tcp was found to be open

192.168.20.20 (tcp/3306)

Port 3306/tcp was found to be open

10114 (1) - ICMP Timestamp Request Remote Date Disclosure

Synopsis

It is possible to determine the exact time set on the remote host.

Description

The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.

Solution

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

Risk Factor

None

References

CVE CVE-1999-0524
XREF OSVDB:94
XREF CWE:200

Plugin Information:

Publication date: 1999/08/01, Modification date: 2012/06/18

Hosts

192.168.20.20 (icmp/0)

The remote clock is synchronized with the local clock.

10267 (1) - SSH Server Type and Version Information

Synopsis

An SSH server is listening on this port.

Description

It is possible to obtain information about the remote SSH server by sending an empty authentication request.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 1999/10/12, Modification date: 2011/10/24

Hosts

192.168.20.20 (tcp/22)


SSH version : SSH-2.0-OpenSSH_5.3
SSH supported authentication : publickey,gssapi-keyex,gssapi-with-mic,password

10287 (1) - Traceroute Information

Synopsis

It was possible to obtain traceroute information.

Description

Makes a traceroute to the remote host.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 1999/11/27, Modification date: 2013/04/11

Hosts

192.168.20.20 (udp/0)

For your information, here is the traceroute from 192.168.20.50 to 192.168.20.20 :
192.168.20.50
192.168.20.20

10719 (1) - MySQL Server Detection

Synopsis

A database server is listening on the remote port.

Description

The remote host is running MySQL, an open source database server.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2001/08/13, Modification date: 2013/01/07

Hosts

192.168.20.20 (tcp/3306)


Version : 5.1.73
Protocol : 10
Server Status : SERVER_STATUS_AUTOCOMMIT
Server Capabilities :
CLIENT_LONG_PASSWORD (new more secure passwords)
CLIENT_FOUND_ROWS (Found instead of affected rows)
CLIENT_LONG_FLAG (Get all column flags)
CLIENT_CONNECT_WITH_DB (One can specify db on connect)
CLIENT_NO_SCHEMA (Don't allow database.table.column)
CLIENT_COMPRESS (Can use compression protocol)
CLIENT_ODBC (ODBC client)
CLIENT_LOCAL_FILES (Can use LOAD DATA LOCAL)
CLIENT_IGNORE_SPACE (Ignore spaces before "("
CLIENT_PROTOCOL_41 (New 4.1 protocol)
CLIENT_INTERACTIVE (This is an interactive client)
CLIENT_SIGPIPE (IGNORE sigpipes)
CLIENT_TRANSACTIONS (Client knows about transactions)
CLIENT_RESERVED (Old flag for 4.1 protocol)
CLIENT_SECURE_CONNECTION (New 4.1 authentication)

10881 (1) - SSH Protocol Versions Supported

Synopsis

A SSH server is running on the remote host.

Description

This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2002/03/06, Modification date: 2013/10/21

Hosts

192.168.20.20 (tcp/22)

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0

SSHv2 host key fingerprint : b4:1c:27:f1:7c:30:7e:c9:37:50:90:30:32:dc:46:ac

11153 (1) - Service Detection (HELP Request)

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP'
request.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2002/11/18, Modification date: 2014/09/03

Hosts

192.168.20.20 (tcp/3306)

A MySQL server is running on this port.

19506 (1) - Nessus Scan Information

Synopsis

Information about the Nessus scan.

Description

This script displays, for each tested host, information about the scan itself :

- The version of the plugin set
- The type of scanner (Nessus or Nessus Home)
- The version of the Nessus Engine
- The port scanner(s) used
- The port range scanned
- Whether credentialed or third-party patch management checks are possible
- The date of the scan
- The duration of the scan
- The number of hosts scanned in parallel
- The number of checks done in parallel

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2005/08/26, Modification date: 2014/12/02

Hosts

192.168.20.20 (tcp/0)

Information about this scan :

Nessus version : 5.2.1 (Nessus 6.1.0 is available - consider upgrading)

Plugin feed version : 201412060215
Scanner edition used : Nessus Home
Scan policy used : Network Scan-centos
Scanner IP : 192.168.20.50
Port scanner(s) : nessus_syn_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 80
Max checks : 5
Recv timeout : 5
Backports : Detected
Allow post-scan editing: Yes
Scan Start Date : 2014/12/6 22:58
Scan duration : 224 sec

22964 (1) - Service Detection

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2007/08/19, Modification date: 2014/07/24

Hosts

192.168.20.20 (tcp/22)

An SSH server is running on this port.

25220 (1) - TCP/IP Timestamps Supported

Synopsis

The remote service implements TCP timestamps.

Description

The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.

See Also

http://www.ietf.org/rfc/rfc1323.txt

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2007/05/16, Modification date: 2011/03/20

Hosts

192.168.20.20 (tcp/0)

35716 (1) - Ethernet Card Manufacturer Detection

Synopsis

The manufacturer can be deduced from the Ethernet OUI.

Description

Each ethernet MAC address starts with a 24-bit 'Organizationally Unique Identifier'.
These OUI are registered by IEEE.

See Also

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2009/02/19, Modification date: 2011/03/27

Hosts

192.168.20.20 (tcp/0)


The following card manufacturers were identified :

c8:60:00:85:d1:7c : ASUSTek COMPUTER INC.

39520 (1) - Backported Security Patch Detection (SSH)

Synopsis

Security patches are backported.

Description

Security patches may have been 'backported' to the remote SSH server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.

See Also

http://www.nessus.org/u?d636c8c7

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2009/06/25, Modification date: 2013/04/03

Hosts

192.168.20.20 (tcp/22)


Give Nessus credentials to perform local checks.

45590 (1) - Common Platform Enumeration (CPE)

Synopsis

It is possible to enumerate CPE names that matched on the remote system.

Description

By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.

See Also

http://cpe.mitre.org/

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2010/04/21, Modification date: 2014/11/20

Hosts

192.168.20.20 (tcp/0)


Following application CPE's matched on the remote system :

cpe:/a:mysql:mysql:5.1.73
cpe:/a:openbsd:openssh:5.3 -> OpenBSD OpenSSH 5.3

70657 (1) - SSH Algorithms and Languages Supported

Synopsis

An SSH server is listening on this port.

Description

This script detects which algorithms and languages are supported by the remote service for encrypting communications.

Solution

n/a

Risk Factor

None

Plugin Information:

Publication date: 2013/10/28, Modification date: 2014/04/04

Hosts

192.168.20.20 (tcp/22)


Nessus negotiated the following encryption algorithm with the server : aes128-cbc

The server supports the following options for kex_algorithms :

diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1

The server supports the following options for server_host_key_algorithms :

ssh-dss
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for encryption_algorithms_server_to_client :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for mac_algorithms_client_to_server :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha2-256
hmac-sha2-512
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

admax_area



関連記事

no image

Nessus:画面

記事を読む

no image

nmap:使う

ubuntu12.10 nmap6.47 ###コマンド例###############

記事を読む

no image

Ubuntu 12.10 ファイアーウォールを有効にしてみる

http://ubuntuapps.blog67.fc2.com/blog-entry-446.ht

記事を読む

no image

ディスプレイの不具合かなにか

ubunntu12.10おかしい ディスプレイの解像度を勝手に変更する。 そのディスプレ

記事を読む

no image

インストール時に困ったとき集

apt-get install で「Not Found」となる現象への対処(Ubuntu)  

記事を読む

no image

Wire Shark

ubuntu12.10 ubuntuソフトウェアセンターからインストール 起動は管理者権限が

記事を読む

no image

Nessus:結果ログcsv

Plugin ID,CVE,CVSS,Risk,Host,Protocol,Port,Name,Sy

記事を読む

no image

Nessus インストール

ubuntu12.10 バージョン確認 cat /etc/lsb-release アー

記事を読む

no image

mysqlとaccess – 02

#テーブルへ外部データを取り込む 文字コードは設定ファイルでutf8に変更したけどうまくいって

記事を読む

no image

Ubuntu:動画みてるときにFlashのローカルストレージがうんたらと表示が出てそれが消えないとき

なぜかクリックしても消えないときは 以下から設定できる ブラウザはFirefox

記事を読む

admax_area



Message

メールアドレスが公開されることはありません。 * が付いている欄は必須項目です

CAPTCHA


日本語が含まれない投稿は無視されますのでご注意ください。(スパム対策)

admax_area



PAGE TOP ↑