瑞星卡卡安全论坛

首页 » 技术交流区 » 反病毒/反流氓软件论坛 » 高手来看看漏洞
not - 2006-3-13 23:31:00
今天有人一直PING我,我就扫描了他一下寄过发现了他又不少漏洞(一定也是个菜鸟),这个漏洞怎么利用?



=================================================================
X-Scan 检测报告
------------------



扫描时间

2006-3-13 下午 02:07:59 - 2006-3-13 下午 02:13:37



检测结果

- 存活主机 : 1
- 漏洞数量 : 4
- 警告数量 : 3
- 提示数量 : 7



主机列表

218.58.79.* (发现安全漏洞)
. OS: Drcom B-RAS; PORT/TCP: 23, 25, 110



详细资料

+ 218.58.79.* :
. 开放端口列表 :
  o telnet (23/tcp) (发现安全提示)
  o smtp (25/tcp) (发现安全提示)
  o pop3 (110/tcp) (发现安全提示)
  o snmp (161/udp) (发现安全漏洞)
  o SNMP (161/tcp) (发现安全漏洞)

. 端口"telnet (23/tcp)"发现安全提示 :


    "TELNET"服务可能运行于该端口.
    NESSUS_ID : 10330

. 端口"telnet (23/tcp)"发现安全提示 :


    通过与服务器建立连接
    并分析接收到的数据可以确定服务器的类型与版本号.
    这为潜在的攻击者提供了其将要攻击的系统的额外信息. 如果可能的话
    版本与类型应当隐藏起来.
   
    解决方案: 更改登陆信息为非特定的内容.
   
    风险等级 : 低
    ___________________________________________________________________
   
    Remote telnet banner :
   
    Welcome To Drcom Network OS
   
   
    Username :
    NESSUS_ID : 10281

. 端口"telnet (23/tcp)"发现安全提示 :


    当前的Telnet在未加密的状态下进行数据传输,任何人通过sniff都很容易监听telnet客户端与telnet服务端之间的登陆用户名与密码!

解决方案:如果你使用的是Unix系列的操作系统,使用OpenSSH替代telnet服务
风险等级:低
___________________________________________________________________

The Telnet service is running.
This service is dangerous in the sense that it is not ciphered - that is,
everyone can sniff the data that passes between the telnet client
and the telnet server. This includes logins and passwords.


Solution:
If you are running a Unix-type system, OpenSSH can be used instead of telnet.
For Unix systems, you can comment out the 'telnet' line in /etc/inetd.conf. 
For Unix systems which use xinetd, you will need to modify the telnet services
file in the /etc/xinetd.d folder.  After making any changes to xinetd or
inetd configuration files, you must restart the service in order for the
changes to take affect.

In addition, many different router and switch manufacturers support SSH as a
telnet replacement. You should contact your vendor for a solution which uses
an encrypted session.


Risk factor : Low
CVE_ID : CAN-1999-0619
NESSUS_ID : 10280



. 端口"smtp (25/tcp)"发现安全提示 :


    "smtp"服务可能运行于该端口.
   
    NESSUS_ID : 10330

. 端口"pop3 (110/tcp)"发现安全提示 :


    "pop3"服务可能运行于该端口.
   
    NESSUS_ID : 10330

. 端口"snmp (161/udp)"发现安全漏洞 :


    Snmp口令:
    "public"


. 端口"snmp (161/udp)"发现安全漏洞 :


    简单网络管理协议(SNMP)是一个
    可以远程管理计算机和网络设备的协议.
    有两种典型的远程监控模式.
    他们可以粗略地分为"读"和"写"(或者是PUBLIC和PRIVATE).
    如果攻击者能猜出一个PUBLIC团体串值,
    那么他就可以从远程设备读取SNMP数据.
    这个信息可能包括
    系统时间,IP地址,接口,运行着的进程,etc等.
    如果攻击者猜出一个PRIVATE团体串值
    (写入或"完全控制"),
    他就有更改远程机器上信息的能力.
    这会是一个极大的安全漏洞,
    能让攻击者成功地破坏网络,运行的进程,ect.
    其实,"完全控制"会给远程攻击者提供在主机上的完全管理权限.
   
    风险等级:高
   
    更多信息请参见:
    http://www.securiteam.com/exploits/Windows_NT_s_SNMP_service_vulnerability.html
___________________________________________________________________


SNMP Agent responded as expected with community name: public
CVE_ID : CAN-1999-0517, CAN-1999-0186, CAN-1999-0254, CAN-1999-0516
BUGTRAQ_ID : 11237, 10576, 177, 2112, 6825, 7081, 7212, 7317, 9681, 986
NESSUS_ID : 10264
Other references : IAVA:2001-B-0001



. 端口"snmp (161/udp)"发现安全漏洞 :


    这个脚本试图使用远程Cisco路由器基于视图的访问控制(View-Based Access
    Control) MIB获得远程private的community字串。
   
    攻击者可以使用这个漏洞获得这个路由器上读/写SNMP的权限。
   
    更多信息 :
    http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml
   
    风险等级 : 高
    ___________________________________________________________________
   
    It was possible to obtain the list of SNMP communities of the
    remote host via SNMP :
   
    . DrcomBRAS:2033
   
    An attacker may use this information to gain r/w access on the
    remote router.
    Solution : disable the SNMP service on the remote host if you do not
              use it, or filter incoming UDP packets going to this port
    See http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml
    Risk factor : High
    BUGTRAQ_ID : 2427
    NESSUS_ID : 10688

. 端口"snmp (161/udp)"发现安全警告 :


    此Nessus脚本通过SNMP获取远程系统中运行的进程列表。
   
    风险等级 : 低
    ___________________________________________________________________
   
    It was possible to obtain the list of processes of the
    remote host via SNMP :
   
    . DrcomBRAS:2033
    . +?
   
    An attacker may use this information to gain more knowledge about
    the target host.
    Solution : disable the SNMP service on the remote host if you do not
              use it, or filter incoming UDP packets going to this port
    Risk factor : Low
    NESSUS_ID : 10550

. 端口"snmp (161/udp)"发现安全警告 :


    此脚本通过SNMP获取远程主机安装的网络接口列表。
   
    风险等级 : 低
    ___________________________________________________________________
   
    It was possible to obtain the list of network interfaces of the
    remote host via SNMP :
   
    . Int Port
    . Ext Port
    . Msg Port
   
    An attacker may use this information to gain more knowledge about
    the target host.
    Solution : disable the SNMP service on the remote host if you do not
              use it, or filter incoming UDP packets going to this port
    Risk factor : Low
    NESSUS_ID : 10551

. 端口"snmp (161/udp)"发现安全警告 :


    此脚本通过SNMP枚举Lanman服务列表。
   
    风险等级 : 低
    ___________________________________________________________________
   
    It was possible to obtain the list of Lanman services of the
    remote host via SNMP :
   
    .                                                                         
                                           
   
    An attacker may use this information to gain more knowledge about
    the target host.
    Solution : disable the SNMP service on the remote host if you do not
              use it, or filter incoming UDP packets going to this port
    Risk factor : Low
    NESSUS_ID : 10547

. 端口"snmp (161/udp)"发现安全提示 :


        sysDescr.0 = Drcom B-RAS
        sysUpTime.0 = 134 Days, 10 Hours, 23 Minutes, 41 Seconds
        sysContact.0 = Drcom,020-38732506/38732507
        sysName.0 = DrcomBRAS:2033m
        sysLocation.0 =
        sysServices.0 = 3
   
    [Snmp网络界面信息]:
        ifNumber.0 = 3
   
        ifIndex.0 = 1
        ifDescr.0 = Int Port
        ifType.0 = Unknown
        ifMtu.0 = 1536
        ifSpeed.0 = 100000000
        ifPhysicalAddress.0 =
        ifAdminStatus.0 = Working normally
        ifOperStatus.0 = Working normally
        ifLastChange.0 = 99538400
        ifInOctets.0 = 1299620101
        ifInUcastPkts.0 = 1724403498
        ifInNUcastPkts.0 = 754010914
        ifInDiscards.0 = 0
        ifInErrors.0 = 0
        ifInUnknownProtos.0 = 0
        ifOutOctets.0 = 3739195897
        ifOutUcastPkts.0 = 1397483954
        ifOutNUcastPkts.0 = 96005334
        ifOutDiscards.0 = 0
        ifOutErrors.0 = 0
        ifOutQLen.0 = 0
   
        ifIndex.1 = 2
        ifDescr.1 = Ext Port
        ifType.1 = Unknown
        ifMtu.1 = 1536
        ifSpeed.1 = 100000000
        ifPhysicalAddress.1 =
        ifAdminStatus.1 = Working normally
        ifOperStatus.1 = Working normally
        ifLastChange.1 = 1161502000
        ifInOctets.1 = 1507150408
        ifInUcastPkts.1 = 1418386546
        ifInNUcastPkts.1 = 5989401
        ifInDiscards.1 = 0
        ifInErrors.1 = 0
        ifInUnknownProtos.1 = 0
        ifOutOctets.1 = 2397738537
        ifOutUcastPkts.1 = 1679318117
        ifOutNUcastPkts.1 = 11846749
        ifOutDiscards.1 = 0
        ifOutErrors.1 = 0
        ifOutQLen.1 = 0
   
        ifIndex.2 = 3
        ifDescr.2 = Msg Port
        ifType.2 = Unknown
        ifMtu.2 = 1536
        ifSpeed.2 = 100000000
        ifPhysicalAddress.2 =
        ifAdminStatus.2 = Working normally
        ifOperStatus.2 = Working normally
        ifLastChange.2 = 1161501700
        ifInOctets.2 = 1996121875
        ifInUcastPkts.2 = 28664453
        ifInNUcastPkts.2 = 448170
        ifInDiscards.2 = 0
        ifInErrors.2 = 0
        ifInUnknownProtos.2 = 0
        ifOutOctets.2 = 3237503343
        ifOutUcastPkts.2 = 28121530
        ifOutNUcastPkts.2 = 193597
        ifOutDiscards.2 = 0
        ifOutErrors.2 = 0
        ifOutQLen.2 = 0
   
   
    [Snmp-IP信息]:
        Address            Net_Mask            Bcast_Address     
    Reasm_Max_Size
   
    [Snmp-TCP信息]:
        State          Local                    Remote                 
   
    [Snmp-UDP信息]:
        Address            Port     
   
    [Snmp-Wins用户列表]:

. 端口"snmp (161/udp)"发现安全提示 :


    此Nessus脚本通过SNMP获取远程操作系统类型信息。
   
    风险等级 : 低
    ___________________________________________________________________
   
    Using SNMP, we could determine that the remote operating system is :
    Drcom B-RAS
    NESSUS_ID : 10800

. 端口"SNMP (161/tcp)"发现安全漏洞 :


    当前脚本使用SNMP获得远程ADSL连接的帐号和密码。
   
    风险等级: 高
    ___________________________________________________________________
   
   
    Using SNMP, it was possible to determine the login/password pair of what
    is likely to be the remote ADSL connection :
    'DrcomBRAS:2033'/'DrcomBRAS:2033'
   
    Solution : Filter incoming traffic to this port, and change your SNMP
    community name to a secret one
    Risk factor : High
    BUGTRAQ_ID : 7212
    NESSUS_ID : 11490




------------------------------------------------------
本报表由网络安全漏洞扫描器"X-Scan"生成.



==========================================================================
1
查看完整版本: 高手来看看漏洞