|
![]() | 作者: seing [seing]
![]() |
登录 |
安全漏洞及解决方案: 217.23.32.13 类型 端口/服务 安全漏洞及解决方案 提示 www (80/tcp) 开放服务 "WEB"服务运行于该端口 BANNER信息 : HTTP/1.1 404 Object Not Found Server: Microsoft-IIS/5.0 Date: Sun, 29 Oct 2006 07:26:19 GMT Content-Type: text/html Content-Length: 111 <html><head><title>Site Not Found</title></head> <body>No web site is configured at this address.</body></html> NESSUS_ID : 10330 提示 www (80/tcp) HTTP 服务器类型及版本 发现 HTTP 服务器的类型及版本号. 解决方案: 配置服务器经常更改名称,如:'Wintendo httpD w/Dotmatrix display' 确保移除类似 apache_pb.gif 带有 Apache 的通用标志, 可以设定 'ServerTokens Prod' 为受限 该信息来源于服务器本身的响应首部. 风险等级 : 低 ___________________________________________________________________ The remote web server type is : Microsoft-IIS/5.0 NESSUS_ID : 10107 提示 Windows Terminal Services (3389/tcp) Windows Terminal Service Enabled The Terminal Services are enabled on the remote host. Terminal Services allow a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host). If an attacker gains a valid login and password, he may be able to use this service to gain further access on the remote host. An attacker may also use this service to mount a dictionnary attack against the remote host to try to log in remotely. Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimates users by impersonating the Windows server. Solution : Disable the Terminal Services if you do not use them, and do not allow this service to run across the internet Risk factor : Low BUGTRAQ_ID : 3099, 7258 NESSUS_ID : 10940 提示 unknown (3000/tcp) 检测MDaemon Server的WorldClient 我们检测到远程web服务器上正在运行MDaemon的WorldClient。该web服务端使得拥有合适用户名和密码的攻击者可以进入本地的邮件箱。 另外,WorldClient早先的版本存在缓冲区溢出漏洞和web遍历的问题(如果存在这些漏洞,风险等级会更高)。 解决方案: 确保所有的用户名和密码都足够长,同时只允许被授权的网络访问该web服务器的端口(使用防火墙屏蔽web服务器端口)。 风险等级:低 更多信息请参考: http://www.securiteam.com/cgi-bin/htsearch?config=htdigSecuriTeam&words=WorldClient ___________________________________________________________________ We detected the remote web server is running WorldClient for MDaemon. This web server enables attackers with the proper username and password combination to access locally stored mailboxes. In addition, earlier versions of WorldClient suffer from buffer overflow vulnerabilities, and web traversal problems (if those are found the Risk factor is higher). Solution: Make sure all usernames and passwords are adequately long and that only authorized networks have access to this web server's port number (block the web server's port number on your firewall). Risk factor : Low For more information see: http://www.securiteam.com/cgi-bin/htsearch?config=htdigSecuriTeam&words=WorldClient BUGTRAQ_ID : 1462, 2478, 4687, 4689, 823 NESSUS_ID : 10745 提示 smtp (25/tcp) SMTP 服务端类型和版本 通过连接服务器并处理缓冲区里接收到的数据,当前脚本检测了SMTP 服务端类型和版本。 该信息向攻击者提供了更多系统信息。应该适当隐藏服务程序的版本和类型。 解决方案: 修改登陆banner不包含相关标识信息 风险等级: 低 ___________________________________________________________________ Remote SMTP server banner : 220 accessme.net ESMTP MDaemon 7.2.2 Sun, 29 Oct 2006 09:32:51 +0200 NESSUS_ID : 10263 提示 pop3 (110/tcp) POP3 Server type and version The remote POP3 servers leak information about the software it is running, through the login banner. This may assist an attacker in choosing an attack strategy. Versions and types should be omitted where possible. The version of the remote POP3 server is : +OK accessme.net POP MDaemon 7.2.2 ready Solution : Change the login banner to something generic. Risk factor : Low NESSUS_ID : 10185 提示 imap (143/tcp) IMAP Banner The remote imap server banner is : * OK accessme.net IMAP4rev1 MDaemon 7.2.2 ready Versions and types should be omitted where possible. Change the imap banner to something generic. NESSUS_ID : 11414 |
地主 发表时间: 06-10-29 16:47 |
|
20CN网络安全小组版权所有
Copyright © 2000-2010 20CN Security Group. All Rights Reserved.
论坛程序编写:NetDemon
粤ICP备05087286号