0% found this document useful (0 votes)
63 views

Tech Report

The document is a vulnerability report generated by Tenable Nessus on December 5, 2024, detailing security issues found on the host with IP 192.168.1.38. It identifies multiple critical vulnerabilities, including an Apache Tomcat A JP connector request injection and an outdated version of Apache Tomcat, along with recommendations for remediation. The report also highlights the risk factors and CVSS scores for each vulnerability, indicating a high level of risk for the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Tech Report

The document is a vulnerability report generated by Tenable Nessus on December 5, 2024, detailing security issues found on the host with IP 192.168.1.38. It identifies multiple critical vulnerabilities, including an Apache Tomcat A JP connector request injection and an outdated version of Apache Tomcat, along with recommendations for remediation. The report also highlights the risk factors and CVSS scores for each vulnerability, indicating a high level of risk for the system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 841

ls

ia
nt
se
Advanced Scan using Nessus
Es

Report generated by Tenable Nessus™ Thu, 05 Dec 2024 16:56:44 IST


us
ss
Ne
TABLE OF CONTENTS

Vulnerabilities by Host
• 192.168.1.38............................................................................................................................................................... 4

• 192.168.1.39...........................................................................................................................................................791

ls
ia
nt
se
Es
us
ss
Ne
ls
ia
nt
se
Vulnerabilities by Host
Es
us
ss
Ne
192.168.1.38

29 95 141 18 167
CRITICAL HIGH MEDIUM LOW INFO

Scan Information

Start time: Thu Dec 5 16:47:23 2024


End time: Thu Dec 5 16:56:44 2024

ls
Host Information

ia
Netbios Name: METASPLOITABLE
IP: 192.168.1.38

nt
MAC Address: 08:00:27:68:92:C1
OS: Linux Kernel 2.6.24-16-server on Ubuntu 8.04
se
Vulnerabilities
134862 - Apache Tomcat A JP Connector Request Injection (Ghostcat)
Es

Synopsis

There is a vulnerable A JP connector listening on the remote host.


us

Description
ss

A file read/inclusion vulnerability was found in A JP connector. A remote, unauthenticated attacker could
exploit this vulnerability to read web application files from a vulnerable server. In instances where the
vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within
a variety of file types and gain remote code execution (RCE).
Ne

See Also

http://www.nessus.org/u?8ebe6246
http://www.nessus.org/u?4e287adb
http://www.nessus.org/u?cbc3d54e
https://access.redhat.com/security/cve/CVE-2020-1745
https://access.redhat.com/solutions/4851251
http://www.nessus.org/u?dd218234
http://www.nessus.org/u?dd772531

192.168.1.38 4
http://www.nessus.org/u?2a01d6bf
http://www.nessus.org/u?3b5af27e
http://www.nessus.org/u?9dab109f
http://www.nessus.org/u?5eafcf70

Solution

Update the A JP configuration to require authorization and/or upgrade the Tomcat server to 7.0.100, 8.5.51,
9.0.31 or later.

Risk Factor

High

CVSS v3.0 Base Score

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score

9.4 (CVSS:3.0/E:H/RL:O/RC:C)

VPR Score

9.0

EPSS Score

0.9737

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

6.5 (CVSS2#E:H/RL:OF/RC:C)

References

CVE CVE-2020-1745
CVE CVE-2020-1938
XREF CISA-KNOWN-EXPLOITED:2022/03/17
XREF CEA-ID:CEA-2020-0021

Plugin Information

Published: 2020/03/24, Modified: 2024/07/17

192.168.1.38 5
Plugin Output

tcp/8009/ajp13

Nessus was able to exploit the issue using the following request :

0x0000: 02 02 00 08 48 54 54 50 2F 31 2E 31 00 00 0F 2F ....HTTP/1.1.../
0x0010: 61 73 64 66 2F 78 78 78 78 78 2E 6A 73 70 00 00 asdf/xxxxx.jsp..
0x0020: 09 6C 6F 63 61 6C 68 6F 73 74 00 FF FF 00 09 6C .localhost.....l
0x0030: 6F 63 61 6C 68 6F 73 74 00 00 50 00 00 09 A0 06 ocalhost..P.....
0x0040: 00 0A 6B 65 65 70 2D 61 6C 69 76 65 00 00 0F 41 ..keep-alive...A
0x0050: 63 63 65 70 74 2D 4C 61 6E 67 75 61 67 65 00 00 ccept-Language..
0x0060: 0E 65 6E 2D 55 53 2C 65 6E 3B 71 3D 30 2E 35 00 .en-US,en;q=0.5.
0x0070: A0 08 00 01 30 00 00 0F 41 63 63 65 70 74 2D 45 ....0...Accept-E
0x0080: 6E 63 6F 64 69 6E 67 00 00 13 67 7A 69 70 2C 20 ncoding...gzip,
0x0090: 64 65 66 6C 61 74 65 2C 20 73 64 63 68 00 00 0D deflate, sdch...
0x00A0: 43 61 63 68 65 2D 43 6F 6E 74 72 6F 6C 00 00 09 Cache-Control...
0x00B0: 6D 61 78 2D 61 67 65 3D 30 00 A0 0E 00 07 4D 6F max-age=0.....Mo
0x00C0: 7A 69 6C 6C 61 00 00 19 55 70 67 72 61 64 65 2D zilla...Upgrade-
0x00D0: 49 6E 73 65 63 75 72 65 2D 52 65 71 75 65 73 74 Insecure-Request
0x00E0: 73 00 00 01 31 00 A0 01 00 09 74 65 78 74 2F 68 s...1.....text/h
0x00F0: 74 6D 6C 00 A0 0B 00 09 6C 6F 63 61 6C 68 6F 73 tml.....localhos
0x0100: 74 00 0A 00 21 6A 61 76 61 78 2E 73 65 72 76 6C t...!javax.servl
0x0110: 65 74 2E 69 6E 63 6C 75 64 65 2E 72 65 71 75 65 et.include.reque
0x0120: 73 74 5F 75 72 69 00 00 01 31 00 0A 00 1F 6A 61 st_uri...1....ja
0x0130: 76 61 78 2E 73 65 72 76 6C 65 74 2E 69 6E 63 6C vax.servlet.incl
0x0140: 75 64 65 2E 70 61 74 68 5F 69 6E 66 6F 00 00 10 ude.path_info...
0x0150: 2F 57 45 42 2D 49 4E 46 2F 77 65 62 2E 78 6D 6C /WEB-INF/web.xml
0x0160: 00 0A 00 22 6A 61 76 61 78 2E 73 65 72 76 6C 65 ..."javax.servle
0x0170: 74 2E 69 6E 63 6C 75 64 65 2E 73 65 72 76 6C 65 t.include.servle
0x0180: 74 5F 70 61 74 68 00 00 00 00 FF t_path.....

This produced the following truncated output (limite [...]

192.168.1.38 6
171340 - Apache Tomcat SEoL (<= 5.5.x)

Synopsis

An unsupported version of Apache Tomcat is installed on the remote host.

Description

According to its version, Apache Tomcat is less than or equal to 5.5.x. It is, therefore, no longer maintained
by its vendor or provider.

Lack of support implies that no new security patches for the product will be released by the vendor. As a
result, it may contain security vulnerabilities.

See Also

https://tomcat.apache.org/tomcat-55-eol.html

Solution

Upgrade to a version of Apache Tomcat that is currently supported.

Risk Factor

Critical

CVSS v3.0 Base Score

10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information

Published: 2023/02/10, Modified: 2024/05/06

Plugin Output

tcp/8180/www

URL : http://192.168.1.38:8180/
Installed version : 5.5
Security End of Life : September 30, 2012
Time since Security End of Life (Est.) : >= 12 years

192.168.1.38 7
77823 - Bash Remote Code Execution (Shellshock)

Synopsis

A system shell on the remote host is vulnerable to command injection.

Description

The remote host is running a version of Bash that is vulnerable to command injection via environment
variable manipulation. Depending on the configuration of the system, an attacker could remotely execute
arbitrary code.

See Also

http://seclists.org/oss-sec/2014/q3/650
http://www.nessus.org/u?dacf7829
https://www.invisiblethreat.ca/post/shellshock/

Solution

Update Bash.

Risk Factor

Critical

CVSS v3.0 Base Score

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score

9.4 (CVSS:3.0/E:H/RL:O/RC:C)

VPR Score

9.5

EPSS Score

0.9734

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

192.168.1.38 8
8.7 (CVSS2#E:H/RL:OF/RC:C)

STIG Severity

References

BID 70103
CVE CVE-2014-6271
XREF EDB-ID:34765
XREF EDB-ID:34766
XREF IAVA:2014-A-0142
XREF CISA-KNOWN-EXPLOITED:2022/07/28
XREF CEA-ID:CEA-2019-0240

Exploitable With

Core Impact (true) Metasploit (true)

Plugin Information

Published: 2014/09/24, Modified: 2022/12/05

Plugin Output

tcp/22/ssh

Nessus was able to set the TERM environment variable used in an SSH
connection to :

() { :;}; /usr/bin/id > /tmp/nessus.1733397936

and read the output from the file :

uid=1000(msfadmin) gid=1000(msfadmin)
groups=4(adm),20(dialout),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev),107(fuse),111(lpadmin),112

Note: Nessus has attempted to remove the file /tmp/nessus.1733397936

192.168.1.38 9
51988 - Bind Shell Backdoor Detection

Synopsis

The remote host may have been compromised.

Description

A shell is listening on the remote port without any authentication being required. An attacker may use it by
connecting to the remote port and sending commands directly.

Solution

Verify if the remote host has been compromised, and reinstall the system if necessary.

Risk Factor

Critical

CVSS v3.0 Base Score

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information

Published: 2011/02/15, Modified: 2022/04/11

Plugin Output

tcp/1524/wild_shell

Nessus was able to execute the command "id" using the


following request :

This produced the following truncated output (limited to 10 lines) :


------------------------------ snip ------------------------------
root@metasploitable:/# uid=0(root) gid=0(root) groups=0(root)
root@metasploitable:/#

------------------------------ snip ------------------------------

192.168.1.38 10
32314 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness

Synopsis

The remote SSH host keys are weak.

Description

The remote SSH host key has been generated on a Debian or Ubuntu system which contains a bug in the
random number generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.

An attacker can easily obtain the private part of the remote key and use this to set up decipher the remote
session or set up a man in the middle attack.

See Also

http://www.nessus.org/u?107f9bdc
http://www.nessus.org/u?f14f4224

Solution

Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.

Risk Factor

Critical

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

192.168.1.38 11
BID 29179
CVE CVE-2008-0166
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/14, Modified: 2024/07/24

Plugin Output

tcp/22/ssh

192.168.1.38 12
32321 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)

Synopsis

The remote SSL certificate uses a weak key.

Description

The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system
which contains a bug in the random number generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.

An attacker can easily obtain the private part of the remote key and use this to decipher the remote session
or set up a man in the middle attack.

See Also

http://www.nessus.org/u?107f9bdc
http://www.nessus.org/u?f14f4224

Solution

Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.

Risk Factor

Critical

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

192.168.1.38 13
BID 29179
CVE CVE-2008-0166
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/15, Modified: 2020/11/16

Plugin Output

tcp/25/smtp

192.168.1.38 14
32321 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)

Synopsis

The remote SSL certificate uses a weak key.

Description

The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system
which contains a bug in the random number generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.

An attacker can easily obtain the private part of the remote key and use this to decipher the remote session
or set up a man in the middle attack.

See Also

http://www.nessus.org/u?107f9bdc
http://www.nessus.org/u?f14f4224

Solution

Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH,
SSL and OpenVPN key material should be re-generated.

Risk Factor

Critical

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

192.168.1.38 15
BID 29179
CVE CVE-2008-0166
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/15, Modified: 2020/11/16

Plugin Output

tcp/5432/postgresql

192.168.1.38 16
20007 - SSL Version 2 and 3 Protocol Detection

Synopsis

The remote service encrypts traffic using a protocol with known weaknesses.

Description

The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:

- An insecure padding scheme with CBC ciphers.

- Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications
between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so
that these versions will be used only if the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE).
Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.

See Also

https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568

Solution

Consult the application's documentation to disable SSL 2.0 and 3.0.


Use TLS 1.2 (with approved cipher suites) or higher instead.

Risk Factor

Critical

CVSS v3.0 Base Score

192.168.1.38 17
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information

Published: 2005/10/12, Modified: 2022/04/04

Plugin Output

tcp/25/smtp

- SSLv2 is enabled and the server supports at least one cipher.

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 RSA(512) RSA RC4(40) MD5
export

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 RSA RSA 3DES-CBC(168) MD5

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

- SSLv3 is enabled and the server supports at least one cipher.


Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA DH RSA DES-CBC(56) SHA
[...]

192.168.1.38 18
20007 - SSL Version 2 and 3 Protocol Detection

Synopsis

The remote service encrypts traffic using a protocol with known weaknesses.

Description

The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are
affected by several cryptographic flaws, including:

- An insecure padding scheme with CBC ciphers.

- Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications
between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so
that these versions will be used only if the client or server support nothing better), many web browsers
implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE).
Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of
enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong
cryptography'.

See Also

https://www.schneier.com/academic/paperfiles/paper-ssl.pdf
http://www.nessus.org/u?b06c7e95
http://www.nessus.org/u?247c4540
https://www.openssl.org/~bodo/ssl-poodle.pdf
http://www.nessus.org/u?5d15ba70
https://www.imperialviolet.org/2014/10/14/poodle.html
https://tools.ietf.org/html/rfc7507
https://tools.ietf.org/html/rfc7568

Solution

Consult the application's documentation to disable SSL 2.0 and 3.0.


Use TLS 1.2 (with approved cipher suites) or higher instead.

Risk Factor

Critical

CVSS v3.0 Base Score

192.168.1.38 19
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information

Published: 2005/10/12, Modified: 2022/04/04

Plugin Output

tcp/5432/postgresql

- SSLv3 is enabled and the server supports at least one cipher.


Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA DH RSA AES-CBC(256)
SHA1
AES128-SHA RSA RSA AES-CBC(128)
SHA1
AES256-SHA RSA RSA AES-CBC(256)
SHA1
RC4-SHA RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 20
32432 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : gnutls12, gnutls13 vulnerabilities (USN-613-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Multiple flaws were discovered in the connection handling of GnuTLS. A remote attacker could exploit this
to crash applications linked against GnuTLS, or possibly execute arbitrary code with permissions of the
application's user.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/613-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.0841

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2008-1948
CVE CVE-2008-1949
CVE CVE-2008-1950
XREF USN:613-1
XREF CWE:189
XREF CWE:287

192.168.1.38 21
Plugin Information

Published: 2008/05/22, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libgnutls13_2.0.4-1ubuntu2


- Fixed package : libgnutls13_2.0.4-1ubuntu2.1

192.168.1.38 22
37936 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : libxml2 vulnerabilities (USN-644-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that libxml2 did not correctly handle long entity names. If a user were tricked into
processing a specially crafted XML document, a remote attacker could execute arbitrary code with
user privileges or cause the application linked against libxml2 to crash, leading to a denial of service.
(CVE-2008-3529)

USN-640-1 fixed vulnerabilities in libxml2. When processing extremely large XML documents with valid
entities, it was possible to incorrectly trigger the newly added vulnerability protections. This update fixes
the problem. (CVE-2008-3281).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/644-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.8634

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.8 (CVSS2#E:POC/RL:OF/RC:C)

192.168.1.38 23
References

BID 30783
CVE CVE-2008-3281
CVE CVE-2008-3529
XREF USN:644-1
XREF CWE:119
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.2

192.168.1.38 24
33531 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/20/22 vulnerabilities
(USN-625-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dirk Nehring discovered that the IPsec protocol stack did not correctly handle fragmented ESP packets. A
remote attacker could exploit this to crash the system, leading to a denial of service.
(CVE-2007-6282)

Johannes Bauer discovered that the 64bit kernel did not correctly handle hrtimer updates. A local attacker
could request a large expiration value and cause the system to hang, leading to a denial of service.
(CVE-2007-6712)

Tavis Ormandy discovered that the ia32 emulation under 64bit kernels did not fully clear uninitialized data.
A local attacker could read private kernel memory, leading to a loss of privacy. (CVE-2008-0598)

Jan Kratochvil discovered that PTRACE did not correctly handle certain calls when running under 64bit
kernels. A local attacker could exploit this to crash the system, leading to a denial of service.
(CVE-2008-1615)

Wei Wang discovered that the ASN.1 decoding routines in CIFS and SNMP NAT did not correctly handle
certain length values. Remote attackers could exploit this to execute arbitrary code or crash the system.
(CVE-2008-1673)

Paul Marks discovered that the SIT interfaces did not correctly manage allocated memory. A remote
attacker could exploit this to fill all available memory, leading to a denial of service. (CVE-2008-2136)

David Miller and Jan Lieskovsky discovered that the Sparc kernel did not correctly range-check memory
regions allocated with mmap. A local attacker could exploit this to crash the system, leading to a denial of
service. (CVE-2008-2137)

The sys_utimensat system call did not correctly check file permissions in certain situations. A local
attacker could exploit this to modify the file times of arbitrary files which could lead to a denial of service.
(CVE-2008-2148)

Brandon Edwards discovered that the DCCP system in the kernel did not correctly check feature lengths. A
remote attacker could exploit this to execute arbitrary code. (CVE-2008-2358)

A race condition was discovered between ptrace and utrace in the kernel. A local attacker could exploit this
to crash the system, leading to a denial of service. (CVE-2008-2365)

The copy_to_user routine in the kernel did not correctly clear memory destination addresses when running
on 64bit kernels. A local attacker could exploit this to gain access to sensitive kernel memory, leading to a
loss of privacy. (CVE-2008-2729)

The PPP over L2TP routines in the kernel did not correctly handle certain messages. A remote attacker
could send a specially crafted packet that could crash the system or execute arbitrary code.
(CVE-2008-2750)

192.168.1.38 25
Gabriel Campana discovered that SCTP routines did not correctly check for large addresses. A local user
could exploit this to allocate all available memory, leading to a denial of service. (CVE-2008-2826).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/625-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

5.9

EPSS Score

0.8756

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.8 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 29081
BID 29086
BID 29235
BID 29589
BID 29603
BID 29747
BID 29942
CVE CVE-2007-6282
CVE CVE-2007-6712
CVE CVE-2008-0598
CVE CVE-2008-1615

192.168.1.38 26
CVE CVE-2008-1673
CVE CVE-2008-2136
CVE CVE-2008-2137
CVE CVE-2008-2148
CVE CVE-2008-2358
CVE CVE-2008-2365
CVE CVE-2008-2729
CVE CVE-2008-2750
CVE CVE-2008-2826
XREF USN:625-1
XREF CWE:16
XREF CWE:20
XREF CWE:119
XREF CWE:189
XREF CWE:200
XREF CWE:264
XREF CWE:362
XREF CWE:399

Plugin Information

Published: 2008/07/17, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-19.36

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 27
36916 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : libxml2 vulnerabilities (USN-673-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Drew Yao discovered that libxml2 did not correctly handle certain corrupt XML documents. If a user or
automated system were tricked into processing a malicious XML document, a remote attacker could cause
applications linked against libxml2 to enter an infinite loop, leading to a denial of service. (CVE-2008-4225)

Drew Yao discovered that libxml2 did not correctly handle large memory allocations. If a user or
automated system were tricked into processing a very large XML document, a remote attacker could cause
applications linked against libxml2 to crash, leading to a denial of service. (CVE-2008-4226).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/673-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

5.9

EPSS Score

0.0181

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2008-4225
CVE CVE-2008-4226
XREF USN:673-1

192.168.1.38 28
XREF CWE:189
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.3

192.168.1.38 29
36454 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : linux-source-2.6.15/22, linux vulnerabilities (USN-714-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Hugo Dias discovered that the ATM subsystem did not correctly manage socket counts. A local attacker
could exploit this to cause a system hang, leading to a denial of service. (CVE-2008-5079)

It was discovered that the libertas wireless driver did not correctly handle beacon and probe responses. A
physically near-by attacker could generate specially crafted wireless network traffic and cause a denial of
service. Ubuntu 6.06 was not affected. (CVE-2008-5134)

It was discovered that the inotify subsystem contained watch removal race conditions. A local attacker
could exploit this to crash the system, leading to a denial of service. (CVE-2008-5182)

Dann Frazier discovered that in certain situations sendmsg did not correctly release allocated memory.
A local attacker could exploit this to force the system to run out of free memory, leading to a denial of
service. Ubuntu 6.06 was not affected. (CVE-2008-5300)

It was discovered that the ATA subsystem did not correctly set timeouts. A local attacker could exploit this
to cause a system hang, leading to a denial of service. (CVE-2008-5700)

It was discovered that the ib700 watchdog timer did not correctly check buffer sizes. A local attacker
could send a specially crafted ioctl to the device to cause a system crash, leading to a denial of service.
(CVE-2008-5702)

It was discovered that in certain situations the network scheduler did not correctly handle very large levels
of traffic. A local attacker could produce a high volume of UDP traffic resulting in a system hang, leading to
a denial of service. Ubuntu 8.04 was not affected.
(CVE-2008-5713).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/714-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

192.168.1.38 30
6.9

EPSS Score

0.0886

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.8 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 32676
CVE CVE-2008-5079
CVE CVE-2008-5134
CVE CVE-2008-5182
CVE CVE-2008-5300
CVE CVE-2008-5700
CVE CVE-2008-5702
CVE CVE-2008-5713
XREF USN:714-1
XREF CWE:119
XREF CWE:362
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-23.48

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 31
44399 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : linux, linux-source-2.6.15 vulnerabilities
(USN-894-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Amerigo Wang and Eric Sesterhenn discovered that the HFS and ext4 filesystems did not correctly check
certain disk structures. If a user were tricked into mounting a specially crafted filesystem, a remote attacker
could crash the system or gain root privileges.
(CVE-2009-4020, CVE-2009-4308)

It was discovered that FUSE did not correctly check certain requests.
A local attacker with access to FUSE mounts could exploit this to crash the system or possibly gain root
privileges. Ubuntu 9.10 was not affected. (CVE-2009-4021)

It was discovered that KVM did not correctly decode certain guest instructions. A local attacker in a guest
could exploit this to trigger high scheduling latency in the host, leading to a denial of service. Ubuntu 6.06
was not affected. (CVE-2009-4031)

It was discovered that the OHCI fireware driver did not correctly handle certain ioctls. A local attacker
could exploit this to crash the system, or possibly gain root privileges. Ubuntu 6.06 was not affected.
(CVE-2009-4138)

Tavis Ormandy discovered that the kernel did not correctly handle O_ASYNC on locked files. A local attacker
could exploit this to gain root privileges. Only Ubuntu 9.04 and 9.10 were affected.
(CVE-2009-4141)

Neil Horman and Eugene Teo discovered that the e1000 and e1000e network drivers did not correctly
check the size of Ethernet frames.
An attacker on the local network could send specially crafted traffic to bypass packet filters, crash the
system, or possibly gain root privileges. (CVE-2009-4536, CVE-2009-4538)

It was discovered that 'print-fatal-signals' reporting could show arbitrary kernel memory contents. A local
attacker could exploit this, leading to a loss of privacy. By default this is disabled in Ubuntu and did not
affect Ubuntu 6.06. (CVE-2010-0003)

Olli Jarva and Tuomo Untinen discovered that IPv6 did not correctly handle jumbo frames. A remote
attacker could exploit this to crash the system, leading to a denial of service. Only Ubuntu 9.04 and 9.10
were affected. (CVE-2010-0006)

Florian Westphal discovered that bridging netfilter rules could be modified by unprivileged users. A local
attacker could disrupt network traffic, leading to a denial of service. (CVE-2010-0007)

Al Viro discovered that certain mremap operations could leak kernel memory. A local attacker could exploit
this to consume all available memory, leading to a denial of service. (CVE-2010-0291).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

192.168.1.38 32
See Also

https://usn.ubuntu.com/894-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.0483

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.8 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 37069
BID 37339
BID 37906
CVE CVE-2009-4020
CVE CVE-2009-4021
CVE CVE-2009-4031
CVE CVE-2009-4138
CVE CVE-2009-4141
CVE CVE-2009-4308
CVE CVE-2009-4536
CVE CVE-2009-4538
CVE CVE-2010-0003
CVE CVE-2010-0006
CVE CVE-2010-0007
CVE CVE-2010-0291
XREF USN:894-1
XREF CWE:20

192.168.1.38 33
XREF CWE:119
XREF CWE:189
XREF CWE:200
XREF CWE:264
XREF CWE:399

Plugin Information

Published: 2010/02/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-27.65

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 34
39800 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : dhcp3 vulnerability (USN-803-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the DHCP client as included in dhcp3 did not verify the length of certain option
fields when processing a response from an IPv4 dhcp server. If a user running Ubuntu 6.06 LTS or 8.04
LTS connected to a malicious dhcp server, a remote attacker could cause a denial of service or execute
arbitrary code as the user invoking the program, typically the 'dhcp' user. For users running Ubuntu 8.10 or
9.04, a remote attacker should only be able to cause a denial of service in the DHCP client. In Ubuntu 9.04,
attackers would also be isolated by the AppArmor dhclient3 profile.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/803-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.0761

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2009-0692
XREF USN:803-1
XREF CWE:119

192.168.1.38 35
Plugin Information

Published: 2009/07/15, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : dhcp3-client_3.0.6.dfsg-1ubuntu9


- Fixed package : dhcp3-client_3.0.6.dfsg-1ubuntu9.1

- Installed package : dhcp3-common_3.0.6.dfsg-1ubuntu9


- Fixed package : dhcp3-common_3.0.6.dfsg-1ubuntu9.1

192.168.1.38 36
40576 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : libxml2 vulnerabilities (USN-815-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that libxml2 did not correctly handle root XML document element DTD definitions. If a
user were tricked into processing a specially crafted XML document, a remote attacker could cause the
application linked against libxml2 to crash, leading to a denial of service. (CVE-2009-2414)

It was discovered that libxml2 did not correctly parse Notation and Enumeration attribute types. If a
user were tricked into processing a specially crafted XML document, a remote attacker could cause the
application linked against libxml2 to crash, leading to a denial of service. (CVE-2009-2416)

USN-644-1 fixed a vulnerability in libxml2. This advisory provides the corresponding update for Ubuntu
9.04.

It was discovered that libxml2 did not correctly handle long entity names. If a user were tricked into
processing a specially crafted XML document, a remote attacker could execute arbitrary code with
user privileges or cause the application linked against libxml2 to crash, leading to a denial of service.
(CVE-2008-3529).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/815-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.8634

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

192.168.1.38 37
CVSS v2.0 Temporal Score

7.8 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 31126
BID 36010
CVE CVE-2008-3529
CVE CVE-2009-2414
CVE CVE-2009-2416
XREF USN:815-1
XREF CWE:119
XREF CWE:399

Plugin Information

Published: 2009/08/12, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.4

192.168.1.38 38
37762 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 : apt vulnerabilities (USN-762-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Alexandre Martani discovered that the APT daily cron script did not check the return code of the date
command. If a machine is configured for automatic updates and is in a time zone where DST occurs
at midnight, under certain circumstances automatic updates might not be applied and could become
permanently disabled. (CVE-2009-1300)

Michael Casadevall discovered that APT did not properly verify repositories signed with a revoked or
expired key. If a repository were signed with only an expired or revoked key and the signature was
otherwise valid, APT would consider the repository valid.
(https://launchpad.net/bugs/356012)

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/762-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

5.9

EPSS Score

0.0074

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2009-1300

192.168.1.38 39
XREF USN:762-1
XREF CWE:20

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : apt_0.7.9ubuntu17


- Fixed package : apt_0.7.9ubuntu17.2

- Installed package : apt-utils_0.7.9ubuntu17


- Fixed package : apt-utils_0.7.9ubuntu17.2

192.168.1.38 40
50044 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS / 10.10 : linux, linux-ec2, linux-
source-2.6.15 vulnerabilities (USN-1000-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Rosenberg discovered that the RDS network protocol did not correctly check certain parameters. A
local attacker could exploit this gain root privileges. (CVE-2010-3904)

Al Viro discovered a race condition in the TTY driver. A local attacker could exploit this to crash the system,
leading to a denial of service. (CVE-2009-4895)

Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly check file permissions. A local
attacker could overwrite append-only files, leading to potential data loss. (CVE-2010-2066)

Dan Rosenberg discovered that the swapexit xfs ioctl did not correctly check file permissions. A local
attacker could exploit this to read from write-only files, leading to a loss of privacy. (CVE-2010-2226)

Suresh Jayaraman discovered that CIFS did not correctly validate certain response packats. A remote
attacker could send specially crafted traffic that would crash the system, leading to a denial of service.
(CVE-2010-2248)

Ben Hutchings discovered that the ethtool interface did not correctly check certain sizes. A local attacker
could perform malicious ioctl calls that could crash the system, leading to a denial of service.
(CVE-2010-2478, CVE-2010-3084)

James Chapman discovered that L2TP did not correctly evaluate checksum capabilities. If an attacker could
make malicious routing changes, they could crash the system, leading to a denial of service.
(CVE-2010-2495)

Neil Brown discovered that NFSv4 did not correctly check certain write requests. A remote attacker could
send specially crafted traffic that could crash the system or possibly gain root privileges.
(CVE-2010-2521)

David Howells discovered that DNS resolution in CIFS could be spoofed.


A local attacker could exploit this to control DNS replies, leading to a loss of privacy and possible privilege
escalation. (CVE-2010-2524)

Dan Rosenberg discovered a flaw in gfs2 file system's handling of acls (access control lists). An unprivileged
local attacker could exploit this flaw to gain access or execute any file stored in the gfs2 file system.
(CVE-2010-2525)

Bob Peterson discovered that GFS2 rename operations did not correctly validate certain sizes. A local
attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-2798)

Eric Dumazet discovered that many network functions could leak kernel stack contents. A local attacker
could exploit this to read portions of kernel memory, leading to a loss of privacy. (CVE-2010-2942,
CVE-2010-3477)

Sergey Vlasov discovered that JFS did not correctly handle certain extended attributes. A local attacker
could bypass namespace access rules, leading to a loss of privacy. (CVE-2010-2946)

192.168.1.38 41
Tavis Ormandy discovered that the IRDA subsystem did not correctly shut down. A local attacker could
exploit this to cause the system to crash or possibly gain root privileges. (CVE-2010-2954)

Brad Spengler discovered that the wireless extensions did not correctly validate certain request sizes.
A local attacker could exploit this to read portions of kernel memory, leading to a loss of privacy.
(CVE-2010-2955)

Tavis Ormandy discovered that the session keyring did not correctly check for its parent. On systems
without a default session keyring, a local attacker could exploit this to crash the system, leading to a denial
of service. (CVE-2010-2960)

Kees Cook discovered that the V4L1 32bit compat interface did not correctly validate certain parameters.
A local attacker on a 64bit system with access to a video device could exploit this to gain root privileges.
(CVE-2010-2963)

Toshiyuki Okajima discovered that ext4 did not correctly check certain parameters. A local attacker could
exploit this to crash the system or overwrite the last block of large files. (CVE-2010-3015)

Tavis Ormandy discovered that the AIO subsystem did not correctly validate certain parameters. A local
attacker could exploit this to crash the system or possibly gain root privileges. (CVE-2010-3067)

Dan Rosenberg discovered that certain XFS ioctls leaked kernel stack contents. A local attacker could exploit
this to read portions of kernel memory, leading to a loss of privacy. (CVE-2010-3078)

Tavis Ormandy discovered that the OSS sequencer device did not correctly shut down. A local attacker
could exploit this to crash the system or possibly gain root privileges. (CVE-2010-3080)

Dan Rosenberg discovered that the ROSE driver did not correctly check parameters. A local attacker with
access to a ROSE network device could exploit this to crash the system or possibly gain root privileges.
(CVE-2010-3310)

Thomas Dreibholz discovered that SCTP did not correctly handle appending packet chunks. A remote
attacker could send specially crafted traffic to crash the system, leading to a denial of service.
(CVE-2010-3432)

Dan Rosenberg discovered that the CD driver did not correctly check parameters. A local attacker could
exploit this to read arbitrary kernel memory, leading to a loss of privacy. (CVE-2010-3437)

Dan Rosenberg discovered that the Sound subsystem did not correctly validate parameters. A local attacker
could exploit this to crash the system, leading to a denial of service. (CVE-2010-3442)

Dan Rosenberg discovered that SCTP did not correctly handle HMAC calculations. A remote attacker could
send specially crafted traffic that would crash the system, leading to a denial of service.
(CVE-2010-3705)

Joel Becker discovered that OCFS2 did not correctly validate on-disk symlink structures. If an attacker were
able to trick a user or automated system into mounting a specially crafted filesystem, it could crash the
system or expose kernel memory, leading to a loss of privacy. (CVE-2010-NNN2).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1000-1/

192.168.1.38 42
Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

8.9

EPSS Score

0.2957

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.7 (CVSS2#E:H/RL:OF/RC:C)

References

BID 40867
BID 40920
BID 41077
BID 41223
BID 41466
BID 41904
BID 42124
BID 42242
BID 42249
BID 42477
BID 42529
BID 42589
BID 42885
BID 42900
BID 42932
BID 43022
BID 43062
BID 43098
BID 43353
BID 43368

192.168.1.38 43
BID 43480
BID 43551
BID 43701
BID 43787
BID 44219
CVE CVE-2009-4895
CVE CVE-2010-2066
CVE CVE-2010-2226
CVE CVE-2010-2248
CVE CVE-2010-2478
CVE CVE-2010-2495
CVE CVE-2010-2521
CVE CVE-2010-2524
CVE CVE-2010-2525
CVE CVE-2010-2798
CVE CVE-2010-2942
CVE CVE-2010-2946
CVE CVE-2010-2954
CVE CVE-2010-2955
CVE CVE-2010-2960
CVE CVE-2010-2963
CVE CVE-2010-3015
CVE CVE-2010-3067
CVE CVE-2010-3078
CVE CVE-2010-3080
CVE CVE-2010-3084
CVE CVE-2010-3310
CVE CVE-2010-3432
CVE CVE-2010-3437
CVE CVE-2010-3442
CVE CVE-2010-3477
CVE CVE-2010-3705
CVE CVE-2010-3904
XREF USN:1000-1
XREF CISA-KNOWN-EXPLOITED:2023/06/02

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2010/10/20, Modified: 2023/05/14

192.168.1.38 44
Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.80

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.80

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 45
49805 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS / 10.10 : openssl vulnerabilities
(USN-1003-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenSSL incorrectly handled return codes from the bn_wexpand function calls. A
remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly
execute arbitrary code with application privileges. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.04
and 9.10.
(CVE-2009-3245)

It was discovered that OpenSSL incorrectly handled certain private keys with an invalid prime. A remote
attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute
arbitrary code with application privileges. The default compiler options for affected releases should reduce
the vulnerability to a denial of service. (CVE-2010-2939).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1003-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

5.9

EPSS Score

0.9414

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

192.168.1.38 46
7.8 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 38562
BID 42306
CVE CVE-2009-3245
CVE CVE-2010-2939
XREF USN:1003-1
XREF CWE:20

Plugin Information

Published: 2010/10/08, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.11

192.168.1.38 47
37337 - Ubuntu 7.10 / 8.04 LTS / 8.10 : linux, linux-source-2.6.22 vulnerabilities (USN-751-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

NFS did not correctly handle races between fcntl and interrupts. A local attacker on an NFS mount could
consume unlimited kernel memory, leading to a denial of service. Ubuntu 8.10 was not affected.
(CVE-2008-4307)

Sparc syscalls did not correctly check mmap regions. A local attacker could cause a system panic, leading to
a denial of service. Ubuntu 8.10 was not affected. (CVE-2008-6107)

In certain situations, cloned processes were able to send signals to parent processes, crossing privilege
boundaries. A local attacker could send arbitrary signals to parent processes, leading to a denial of service.
(CVE-2009-0028)

The kernel keyring did not free memory correctly. A local attacker could consume unlimited kernel memory,
leading to a denial of service.
(CVE-2009-0031)

The SCTP stack did not correctly validate FORWARD-TSN packets. A remote attacker could send specially
crafted SCTP traffic causing a system crash, leading to a denial of service. (CVE-2009-0065)

The eCryptfs filesystem did not correctly handle certain VFS return codes. A local attacker with write-access
to an eCryptfs filesystem could cause a system crash, leading to a denial of service.
(CVE-2009-0269)

The Dell platform device did not correctly validate user parameters. A local attacker could perform specially
crafted reads to crash the system, leading to a denial of service. (CVE-2009-0322)

The page fault handler could consume stack memory. A local attacker could exploit this to crash the system
or gain root privileges with a Kprobe registered. Only Ubuntu 8.10 was affected. (CVE-2009-0605)

Network interfaces statistics for the SysKonnect FDDI driver did not check capabilities. A local user could
reset statistics, potentially interfering with packet accounting systems. (CVE-2009-0675)

The getsockopt function did not correctly clear certain parameters. A local attacker could read leaked
kernel memory, leading to a loss of privacy. (CVE-2009-0676)

The ext4 filesystem did not correctly clear group descriptors when resizing. A local attacker could exploit
this to crash the system, leading to a denial of service. (CVE-2009-0745)

The ext4 filesystem did not correctly validate certain fields. A local attacker could mount a malicious
ext4 filesystem, causing a system crash, leading to a denial of service. (CVE-2009-0746, CVE-2009-0747,
CVE-2009-0748)

The syscall interface did not correctly validate parameters when crossing the 64-bit/32-bit boundary. A local
attacker could bypass certain syscall restricts via crafted syscalls. (CVE-2009-0834, CVE-2009-0835)

The shared memory subsystem did not correctly handle certain shmctl calls when CONFIG_SHMEM
was disabled. Ubuntu kernels were not vulnerable, since CONFIG_SHMEM is enabled by default.
(CVE-2009-0859)

192.168.1.38 48
The virtual consoles did not correctly handle certain UTF-8 sequences.
A local attacker on the physical console could exploit this to cause a system crash, leading to a denial of
service. (CVE-2009-1046).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/751-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.9469

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.8 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 33113
BID 33672
BID 33846
BID 33948
BID 33951
BID 34020
CVE CVE-2008-4307
CVE CVE-2008-6107
CVE CVE-2009-0028
CVE CVE-2009-0031

192.168.1.38 49
CVE CVE-2009-0065
CVE CVE-2009-0269
CVE CVE-2009-0322
CVE CVE-2009-0605
CVE CVE-2009-0675
CVE CVE-2009-0676
CVE CVE-2009-0745
CVE CVE-2009-0746
CVE CVE-2009-0747
CVE CVE-2009-0748
CVE CVE-2009-0834
CVE CVE-2009-0835
CVE CVE-2009-0859
CVE CVE-2009-1046
XREF USN:751-1
XREF CWE:20
XREF CWE:119
XREF CWE:189
XREF CWE:264
XREF CWE:362
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-23.52

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 50
58444 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : freetype vulnerabilities (USN-1403-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1126)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1127)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If
a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1128)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Type42 font files. If
a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1129)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed PCF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1130)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If
a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1131)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Type1 font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1132)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges.
(CVE-2012-1133)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Type1 font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges.
(CVE-2012-1134)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If
a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1135)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges.
(CVE-2012-1136)

192.168.1.38 51
Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1137)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If
a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1138)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1139)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed PostScript font files.
If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to
crash. (CVE-2012-1140)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1141)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Windows FNT/
FON font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause
FreeType to crash. (CVE-2012-1142)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed font files. If a user
were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash.
(CVE-2012-1143)

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If
a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash
or possibly execute arbitrary code with user privileges. (CVE-2012-1144).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1403-1/

Solution

Update the affected libfreetype6 package.

Risk Factor

Critical

VPR Score

5.9

EPSS Score

192.168.1.38 52
0.4658

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.4 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52318
CVE CVE-2012-1126
CVE CVE-2012-1127
CVE CVE-2012-1128
CVE CVE-2012-1129
CVE CVE-2012-1130
CVE CVE-2012-1131
CVE CVE-2012-1132
CVE CVE-2012-1133
CVE CVE-2012-1134
CVE CVE-2012-1135
CVE CVE-2012-1136
CVE CVE-2012-1137
CVE CVE-2012-1138
CVE CVE-2012-1139
CVE CVE-2012-1140
CVE CVE-2012-1141
CVE CVE-2012-1142
CVE CVE-2012-1143
CVE CVE-2012-1144
XREF USN:1403-1

Plugin Information

Published: 2012/03/23, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libfreetype6_2.3.5-1ubuntu4.8.04.2


- Fixed package : libfreetype6_2.3.5-1ubuntu4.8.04.9

192.168.1.38 53
58743 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : samba vulnerability (USN-1423-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure
calls (RPC) over the network. A remote, unauthenticated attacker could exploit this to execute arbitrary
code as the root user. (CVE-2012-1182).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1423-1/

Solution

Update the affected samba package.

Risk Factor

Critical

VPR Score

7.4

EPSS Score

0.8159

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

BID 52973
CVE CVE-2012-1182
XREF USN:1423-1

192.168.1.38 54
Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2012/04/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.18

192.168.1.38 55
40529 - Ubuntu 8.04 LTS / 8.10 / 9.04 : apr vulnerability (USN-813-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Matt Lewis discovered that apr did not properly sanitize its input when allocating memory. If an application
using apr processed crafted input, a remote attacker could cause a denial of service or potentially execute
arbitrary code as the user invoking the application.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/813-1/

Solution

Update the affected libapr1, libapr1-dbg and / or libapr1-dev packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.1482

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.4 (CVSS2#E:U/RL:OF/RC:C)

References

BID 35949
CVE CVE-2009-2412
XREF USN:813-1

192.168.1.38 56
XREF CWE:189

Plugin Information

Published: 2009/08/10, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libapr1_1.2.11-1


- Fixed package : libapr1_1.2.11-1ubuntu0.1

192.168.1.38 57
40531 - Ubuntu 8.04 LTS / 8.10 / 9.04 : apr-util vulnerability (USN-813-3)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-813-1 fixed vulnerabilities in apr. This update provides the corresponding updates for apr-util.

Matt Lewis discovered that apr did not properly sanitize its input when allocating memory. If an application
using apr processed crafted input, a remote attacker could cause a denial of service or potentially execute
arbitrary code as the user invoking the application.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/813-3/

Solution

Update the affected libaprutil1, libaprutil1-dbg and / or libaprutil1-dev packages.

Risk Factor

Critical

VPR Score

6.7

EPSS Score

0.1482

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.4 (CVSS2#E:U/RL:OF/RC:C)

References

BID 35949

192.168.1.38 58
CVE CVE-2009-2412
XREF USN:813-3
XREF CWE:189

Plugin Information

Published: 2009/08/10, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libaprutil1_1.2.12+dfsg-3


- Fixed package : libaprutil1_1.2.12+dfsg-3ubuntu0.2

192.168.1.38 59
56388 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1225-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Timo Warns discovered that the EFI GUID partition table was not correctly parsed. A physically local
attacker that could insert mountable devices could exploit this to crash the system or possibly gain root
privileges. (CVE-2011-1776)

Dan Rosenberg discovered that the IPv4 diagnostic routines did not correctly validate certain requests. A
local attacker could exploit this to consume CPU resources, leading to a denial of service.
(CVE-2011-2213)

Dan Rosenberg discovered that the Bluetooth stack incorrectly handled certain L2CAP requests. If a system
was using Bluetooth, a remote attacker could send specially crafted traffic to crash the system or gain root
privileges. (CVE-2011-2497)

Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote
attacker could exploit this to exhaust network resources, leading to a denial of service.
(CVE-2011-2699)

Time Warns discovered that long symlinks were incorrectly handled on Be filesystems. A local attacker
could exploit this with a malformed Be filesystem and crash the system, leading to a denial of service.
(CVE-2011-2928)

Darren Lavender discovered that the CIFS client incorrectly handled certain large values. A remote attacker
with a malicious server could exploit this to crash the system or possibly execute arbitrary code as the root
user. (CVE-2011-3191).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1225-1/

Solution

Update the affected packages.

Risk Factor

Critical

VPR Score

5.9

192.168.1.38 60
EPSS Score

0.0121

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.7 (CVSS2#E:ND/RL:OF/RC:ND)

References

BID 47796
BID 48333
BID 48472
BID 48802
BID 49256
BID 49295
CVE CVE-2011-1776
CVE CVE-2011-2213
CVE CVE-2011-2497
CVE CVE-2011-2699
CVE CVE-2011-2928
CVE CVE-2011-3191
XREF USN:1225-1

Plugin Information

Published: 2011/10/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.94

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 61
46882 - UnrealIRCd Backdoor Detection

Synopsis

The remote IRC server contains a backdoor.

Description

The remote IRC server is a version of UnrealIRCd with a backdoor that allows an attacker to execute
arbitrary code on the affected host.

See Also

https://seclists.org/fulldisclosure/2010/Jun/277
https://seclists.org/fulldisclosure/2010/Jun/284
http://www.unrealircd.com/txt/unrealsecadvisory.20100612.txt

Solution

Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.

Risk Factor

Critical

VPR Score

7.4

EPSS Score

0.6661

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

BID 40820
CVE CVE-2010-2075

Exploitable With

192.168.1.38 62
CANVAS (true) Metasploit (true)

Plugin Information

Published: 2010/06/14, Modified: 2022/04/11

Plugin Output

tcp/6667/irc

The remote IRC server is running as :

uid=0(root) gid=0(root)

192.168.1.38 63
61708 - VNC Server 'password' Password

Synopsis

A VNC server running on the remote host is secured with a weak password.

Description

The VNC server running on the remote host is secured with a weak password. Nessus was able to login
using VNC authentication and a password of 'password'. A remote, unauthenticated attacker could exploit
this to take control of the system.

Solution

Secure the VNC service with a strong password.

Risk Factor

Critical

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Plugin Information

Published: 2012/08/29, Modified: 2015/09/24

Plugin Output

tcp/5900/vnc

Nessus logged in using a password of "password".

192.168.1.38 64
32320 - Weak Debian OpenSSH Keys in ~/.ssh/authorized_keys

Synopsis

The remote SSH host is set up to accept authentication with weak Debian SSH keys.

Description

The remote host has one or more ~/.ssh/authorized_keys files containing weak SSH public keys generated
on a Debian or Ubuntu system.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of
OpenSSL.

This problem does not only affect Debian since any user uploading a weak SSH key into the ~/.ssh/
authorized_keys file will compromise the security of the remote system.

An attacker could try a brute-force attack against the remote host and logon using these weak keys.

Solution

Remove all the offending entries from ~/.ssh/authorized_keys.

Risk Factor

Critical

CVSS v3.0 Base Score

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

References

BID 29179

192.168.1.38 65
CVE CVE-2008-0166
XREF CERT:925211
XREF EDB-ID:5720
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/15, Modified: 2023/11/27

Plugin Output

tcp/0

In file /root/.ssh/authorized_keys:
line 1:
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEApmGJFZNl0ibMNALQx7M6sGGoi4KNmj6PVxpb
pG70lShHQqldJkcteZZdPFSbW76IUiPR0Oh+WBV0x1c6iPL/0zUYFHyFKAz1e6/5teoweG1j
r2qOffdomVhvXXvSjGaSFwwOYB8R0QxsOWWTQTYSeBa66X6e777GVkHCDLYgZSo8wWr5JXln
/Tw7XotowHr8FEGvw2zW1krU3Zo9Bzp0e0ac2U+qUGIzIu/WwgztLZs5/D9IyhtRWocyQPE+
kcP+Jz2mt4y1uA73KqoXfdw5oGUkxdFo9f1nu2OwkjOc+Wv8Vw7bwkf+1RgiOMgiJ5cCs4Wo
cyVxsXovcNnbALTp3w== msfadmin@metasploitable

In file /home/msfadmin/.ssh/id_rsa.pub:
line 1:
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEApmGJFZNl0ibMNALQx7M6sGGoi4KNmj6PVxpb
pG70lShHQqldJkcteZZdPFSbW76IUiPR0Oh+WBV0x1c6iPL/0zUYFHyFKAz1e6/5teoweG1j
r2qOffdomVhvXXvSjGaSFwwOYB8R0QxsOWWTQTYSeBa66X6e777GVkHCDLYgZSo8wWr5JXln
/Tw7XotowHr8FEGvw2zW1krU3Zo9Bzp0e0ac2U+qUGIzIu/WwgztLZs5/D9IyhtRWocyQPE+
kcP+Jz2mt4y1uA73KqoXfdw5oGUkxdFo9f1nu2OwkjOc+Wv8Vw7bwkf+1RgiOMgiJ5cCs4Wo
cyVxsXovcNnbALTp3w== msfadmin@metasploitable

In file /home/msfadmin/.ssh/authorized_keys:
line 1:
ssh-dss AAAAB3NzaC1kc3MAAACBANWgcbHvxF2YRX0gTizyoZazzHiU5+63hKFOhzJch8dZ
QpFU5gGkDkZ30rC4jrNqCXNDN50RA4ylcNtO78B/I4+5YCZ39faSiXIoLfi8tOVWtTtg3lku
v3eSV0zuSGeqZPHMtep6iizQA5yoClkCyj8swXH+cPBG5uRPiXYL911rAAAAFQDL+pKrLy6v
y9HCywXWZ/jcPpPHEQAAAIAgt+cN3fDT1RRCYz/VmqfUsqW4jtZ06kvx3L82T2Z1YVeXe792
9JWeu9d3OB+NeE8EopMiWaTZT0WI+OkzxSAGyuTskue4nvGCfxnDr58xa1pZcSO66R5jCSAR
MHU6WBWId3MYzsJNZqTN4uoRa4tIFwM8X99K0UUVmLvNbPByEAAAAIBNfKRDwM/QnEpdRTTs
RBh9rALq6eDbLNbu/5gozf4Fv1Dt1Zmq5ZxtXeQtW5BYyorILRZ5/Y4pChRa01bxTRSJah0R
Jk5wxAUPZ282N07fzcJyVlBojMvPlbAplpSiecCuLGX7G04Ie8SFzT+wCketP9Vrw0PvtUZU
3DfrVTCytg== user@metasploitable

192.168.1.38 66
136769 - ISC BIND Service Downgrade / Reflected DoS

Synopsis

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.

Description

According to its self-reported version, the instance of ISC BIND 9 running on the remote name server
is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not
sufficiently limiting the number fetches which may be performed while processing a referral response.

An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or
to use the affected server as a reflector in a reflection attack.

See Also

https://kb.isc.org/docs/cve-2020-8616

Solution

Upgrade to the ISC BIND version referenced in the vendor advisory.

Risk Factor

Medium

CVSS v3.0 Base Score

8.6 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)

CVSS v3.0 Temporal Score

7.7 (CVSS:3.0/E:P/RL:O/RC:C)

VPR Score

5.2

EPSS Score

0.0164

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 67
3.9 (CVSS2#E:POC/RL:OF/RC:C)

STIG Severity

References

CVE CVE-2020-8616
XREF IAVA:2020-A-0217-S

Plugin Information

Published: 2020/05/22, Modified: 2024/03/12

Plugin Output

udp/53/dns

Installed version : 9.4.2


Fixed version : 9.11.19

192.168.1.38 68
42256 - NFS Shares World Readable

Synopsis

The remote NFS server exports world-readable shares.

Description

The remote NFS server is exporting one or more shares without restricting access (based on hostname, IP,
or IP range).

See Also

http://www.tldp.org/HOWTO/NFS-HOWTO/security.html

Solution

Place the appropriate restrictions on all NFS shares.

Risk Factor

Medium

CVSS v3.0 Base Score

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2009/10/26, Modified: 2024/02/21

Plugin Output

tcp/2049/rpc-nfs

The following shares have no access restrictions :

/ *

192.168.1.38 69
42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)

Synopsis

The remote service supports the use of medium strength SSL ciphers.

Description

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that
uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.

See Also

https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info

Solution

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Risk Factor

Medium

CVSS v3.0 Base Score

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

VPR Score

5.1

EPSS Score

0.0053

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

References

CVE CVE-2016-2183

192.168.1.38 70
Plugin Information

Published: 2009/11/23, Modified: 2021/02/03

Plugin Output

tcp/25/smtp

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 71
42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)

Synopsis

The remote service supports the use of medium strength SSL ciphers.

Description

The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards
medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that
uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same
physical network.

See Also

https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://sweet32.info

Solution

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Risk Factor

Medium

CVSS v3.0 Base Score

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

VPR Score

5.1

EPSS Score

0.0053

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

References

CVE CVE-2016-2183

192.168.1.38 72
Plugin Information

Published: 2009/11/23, Modified: 2021/02/03

Plugin Output

tcp/5432/postgresql

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 73
90509 - Samba Badlock Vulnerability

Synopsis

An SMB server running on the remote host is affected by the Badlock vulnerability.

Description

The version of Samba, a CIFS/SMB server for Linux and Unix, running on the remote host is affected by
a flaw, known as Badlock, that exists in the Security Account Manager (SAM) and Local Security Authority
(Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure
Call (RPC) channels. A man-in-the-middle attacker who is able to able to intercept the traffic between a
client and a server hosting a SAM database can exploit this flaw to force a downgrade of the authentication
level, which allows the execution of arbitrary Samba network calls in the context of the intercepted user,
such as viewing or modifying sensitive security data in the Active Directory (AD) database or disabling
critical services.

See Also

http://badlock.org
https://www.samba.org/samba/security/CVE-2016-2118.html

Solution

Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.

Risk Factor

Medium

CVSS v3.0 Base Score

7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score

6.5 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

5.9

EPSS Score

0.0358

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

192.168.1.38 74
CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 86002
CVE CVE-2016-2118
XREF CERT:813296

Plugin Information

Published: 2016/04/13, Modified: 2019/11/20

Plugin Output

tcp/445/cifs

Nessus detected that the Samba Badlock patch has not been applied.

192.168.1.38 75
34048 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/20/22 vulnerabilities
(USN-637-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that there were multiple NULL pointer function dereferences in the Linux kernel terminal
handling code. A local attacker could exploit this to execute arbitrary code as root, or crash the system,
leading to a denial of service. (CVE-2008-2812)

The do_change_type routine did not correctly validation administrative users. A local attacker could exploit
this to block mount points or cause private mounts to be shared, leading to denial of service or a possible
loss of privacy. (CVE-2008-2931)

Tobias Klein discovered that the OSS interface through ALSA did not correctly validate the device number. A
local attacker could exploit this to access sensitive kernel memory, leading to a denial of service or a loss of
privacy. (CVE-2008-3272)

Zoltan Sogor discovered that new directory entries could be added to already deleted directories. A local
attacker could exploit this, filling up available memory and disk space, leading to a denial of service.
(CVE-2008-3275)

In certain situations, the fix for CVE-2008-0598 from USN-623-1 was causing infinite loops in the writev
syscall. This update corrects the mistake. We apologize for the inconvenience.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/637-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0004

192.168.1.38 76
CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 30076
BID 30126
BID 30559
BID 30647
CVE CVE-2008-0598
CVE CVE-2008-2812
CVE CVE-2008-2931
CVE CVE-2008-3272
CVE CVE-2008-3275
XREF USN:637-1
XREF CWE:20
XREF CWE:189
XREF CWE:200
XREF CWE:264
XREF CWE:399

Plugin Information

Published: 2008/08/26, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-19.41

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 77
33504 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : pcre3 vulnerability (USN-624-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Tavis Ormandy discovered that the PCRE library did not correctly handle certain in-pattern options. An
attacker could cause applications linked against pcre3 to crash, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/624-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.6

EPSS Score

0.0036

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-2008-2371
XREF USN:624-1
XREF CWE:119

Plugin Information

Published: 2008/07/15, Modified: 2021/01/19

192.168.1.38 78
Plugin Output

tcp/0

- Installed package : libpcre3_7.4-1ubuntu2


- Fixed package : libpcre3_7.4-1ubuntu2.1

192.168.1.38 79
33388 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : samba regression (USN-617-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-617-1 fixed vulnerabilities in Samba. The upstream patch introduced a regression where under certain
circumstances accessing large files might cause the client to report an invalid packet length error. This
update fixes the problem.

We apologize for the inconvenience.

Samba developers discovered that nmbd could be made to overrun a buffer during the processing of
GETDC logon server requests. When samba is configured as a Primary or Backup Domain Controller,
a remote attacker could send malicious logon requests and possibly cause a denial of service.
(CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that Samba did not properly perform bounds checking
when parsing SMB replies. A remote attacker could send crafted SMB packets and execute arbitrary code.
(CVE-2008-1105).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/617-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.0

EPSS Score

0.9688

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

192.168.1.38 80
References

CVE CVE-2007-4572
CVE CVE-2008-1105
XREF USN:617-2
XREF CWE:119

Plugin Information

Published: 2008/07/02, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.4

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.4

192.168.1.38 81
33217 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : samba vulnerabilities (USN-617-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Samba developers discovered that nmbd could be made to overrun a buffer during the processing of
GETDC logon server requests. When samba is configured as a Primary or Backup Domain Controller,
a remote attacker could send malicious logon requests and possibly cause a denial of service.
(CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that Samba did not properly perform bounds checking when
parsing SMB replies. A remote attacker could send crafted SMB packets and execute arbitrary code.
(CVE-2008-1105).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/617-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.0

EPSS Score

0.9688

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

References

CVE CVE-2007-4572
CVE CVE-2008-1105

192.168.1.38 82
XREF USN:617-1
XREF CWE:119

Plugin Information

Published: 2008/06/18, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.2

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.2

192.168.1.38 83
37683 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : linux, linux-source-2.6.15/22 vulnerabilities
(USN-679-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the Xen hypervisor block driver did not correctly validate requests. A user with root
privileges in a guest OS could make a malicious IO request with a large number of blocks that would crash
the host OS, leading to a denial of service. This only affected Ubuntu 7.10. (CVE-2007-5498)

It was discovered the the i915 video driver did not correctly validate memory addresses. A local attacker
could exploit this to remap memory that could cause a system crash, leading to a denial of service. This
issue did not affect Ubuntu 6.06 and was previous fixed for Ubuntu 7.10 and 8.04 in USN-659-1. Ubuntu
8.10 has now been corrected as well. (CVE-2008-3831)

David Watson discovered that the kernel did not correctly strip permissions when creating files in setgid
directories. A local user could exploit this to gain additional group privileges. This issue only affected
Ubuntu 6.06. (CVE-2008-4210)

Olaf Kirch and Miklos Szeredi discovered that the Linux kernel did not correctly reject the 'append' flag
when handling file splice requests.
A local attacker could bypass append mode and make changes to arbitrary locations in a file. This issue
only affected Ubuntu 7.10 and 8.04. (CVE-2008-4554)

It was discovered that the SCTP stack did not correctly handle INIT-ACK. A remote user could exploit this
by sending specially crafted SCTP traffic which would trigger a crash in the system, leading to a denial of
service. This issue did not affect Ubuntu 8.10.
(CVE-2008-4576)

It was discovered that the SCTP stack did not correctly handle bad packet lengths. A remote user could
exploit this by sending specially crafted SCTP traffic which would trigger a crash in the system, leading to a
denial of service. This issue did not affect Ubuntu 8.10.
(CVE-2008-4618)

Eric Sesterhenn discovered multiple flaws in the HFS+ filesystem. If a local user or automated system were
tricked into mounting a malicious HFS+ filesystem, the system could crash, leading to a denial of service.
(CVE-2008-4933, CVE-2008-4934, CVE-2008-5025)

It was discovered that the Unix Socket handler did not correctly process the SCM_RIGHTS message. A local
attacker could make a malicious socket request that would crash the system, leading to a denial of service.
(CVE-2008-5029)

It was discovered that the driver for simple i2c audio interfaces did not correctly validate certain function
pointers. A local user could exploit this to gain root privileges or crash the system, leading to a denial of
service. (CVE-2008-5033).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

192.168.1.38 84
See Also

https://usn.ubuntu.com/679-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

8.6

EPSS Score

0.0954

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 31368
BID 31634
BID 31792
BID 31903
BID 32093
BID 32094
BID 32154
BID 32289
CVE CVE-2007-5498
CVE CVE-2008-3831
CVE CVE-2008-4210
CVE CVE-2008-4554
CVE CVE-2008-4576
CVE CVE-2008-4618
CVE CVE-2008-4933
CVE CVE-2008-4934
CVE CVE-2008-5025

192.168.1.38 85
CVE CVE-2008-5029
CVE CVE-2008-5033
XREF USN:679-1
XREF CWE:20
XREF CWE:119
XREF CWE:264
XREF CWE:287
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-22.45

- Installed package : linux-ubuntu-modules-2.6.24-16-server_2.6.24-16.23


- Fixed package : linux-ubuntu-modules-2.6.24-<ANY>-server_2.6.24-22.35

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 86
37654 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : shadow vulnerability (USN-695-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Paul Szabo discovered a race condition in login. While setting up tty permissions, login did not correctly
handle symlinks. If a local attacker were able to gain control of the system utmp file, they could cause login
to change the ownership and permissions on arbitrary files, leading to a root privilege escalation.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/695-1/

Solution

Update the affected login and / or passwd packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0004

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2008-5394
XREF USN:695-1
XREF CWE:59

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

192.168.1.38 87
Plugin Output

tcp/0

- Installed package : login_1:4.0.18.2-1ubuntu2


- Fixed package : login_1:4.0.18.2-1ubuntu2.2

192.168.1.38 88
36530 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : udev vulnerabilities (USN-758-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Sebastian Krahmer discovered that udev did not correctly validate netlink message senders. A local
attacker could send specially crafted messages to udev in order to gain root privileges. (CVE-2009-1185)

Sebastian Krahmer discovered a buffer overflow in the path encoding routines in udev. A local attacker
could exploit this to crash udev, leading to a denial of service. (CVE-2009-1186).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/758-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

10.0

EPSS Score

0.0005

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.3 (CVSS2#E:H/RL:OF/RC:C)

References

CVE CVE-2009-1185

192.168.1.38 89
CVE CVE-2009-1186
XREF USN:758-1
XREF CWE:20
XREF CWE:119

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libvolume-id0_117-8


- Fixed package : libvolume-id0_117-8ubuntu0.2

- Installed package : udev_117-8


- Fixed package : udev_117-8ubuntu0.2

192.168.1.38 90
37886 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : vm-builder vulnerability (USN-670-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Mathias Gug discovered that vm-builder improperly set the root password when creating virtual machines.
An attacker could exploit this to gain root privileges to the virtual machine by using a predictable password.

This vulnerability only affects virtual machines created with vm-builder under Ubuntu 8.10, and does
not affect native Ubuntu installations. An update was made to the shadow package to detect vulnerable
systems and disable password authentication for the root account. Vulnerable virtual machines which an
attacker has access to should be considered compromised, and appropriate actions taken to secure the
machine.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/670-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0011

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 91
References

CVE CVE-2008-5103
CVE CVE-2008-5104
XREF USN:670-1
XREF CWE:255

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : passwd_1:4.0.18.2-1ubuntu2


- Fixed package : passwd_1:4.0.18.2-1ubuntu2.1

192.168.1.38 92
36681 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : linux, linux-source-2.6.15/22 vulnerabilities (USN-659-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the direct-IO subsystem did not correctly validate certain structures. A local attacker
could exploit this to cause a system crash, leading to a denial of service. (CVE-2007-6716)

It was discovered that the disabling of the ZERO_PAGE optimization could lead to large memory
consumption. A local attacker could exploit this to allocate all available memory, leading to a denial of
service.
(CVE-2008-2372)

It was discovered that the Datagram Congestion Control Protocol (DCCP) did not correctly validate its
arguments. If DCCP was in use, a remote attacker could send specially crafted network traffic and cause a
system crash, leading to a denial of service. (CVE-2008-3276)

It was discovered that the SBNI WAN driver did not correctly check for the NET_ADMIN capability. A
malicious local root user lacking CAP_NET_ADMIN would be able to change the WAN device configuration,
leading to a denial of service. (CVE-2008-3525)

It was discovered that the Stream Control Transmission Protocol (SCTP) did not correctly validate the key
length in the SCTP_AUTH_KEY option.
If SCTP is in use, a remote attacker could send specially crafted network traffic that would crash the system,
leading to a denial of service. (CVE-2008-3526)

It was discovered that the tmpfs implementation did not correctly handle certain sequences of inode
operations. A local attacker could exploit this to crash the system, leading to a denial of service.
(CVE-2008-3534)

It was discovered that the readv/writev functions did not correctly handle certain sequences of file
operations. A local attacker could exploit this to crash the system, leading to a denial of service.
(CVE-2008-3535)

It was discovered that SCTP did not correctly validate its userspace arguments. A local attacker could call
certain sctp_* functions with malicious options and cause a system crash, leading to a denial of service.
(CVE-2008-3792, CVE-2008-4113, CVE-2008-4445)

It was discovered the the i915 video driver did not correctly validate memory addresses. A local attacker
could exploit this to remap memory that could cause a system crash, leading to a denial of service.
(CVE-2008-3831)

Johann Dahm and David Richter discovered that NFSv4 did not correctly handle certain file ACLs. If NFSv4 is
in use, a local attacker could create a malicious ACL that could cause a system crash, leading to a denial of
service. (CVE-2008-3915).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

192.168.1.38 93
See Also

https://usn.ubuntu.com/659-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.6779

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 31515
BID 31792
CVE CVE-2007-6716
CVE CVE-2008-2372
CVE CVE-2008-3276
CVE CVE-2008-3525
CVE CVE-2008-3526
CVE CVE-2008-3534
CVE CVE-2008-3535
CVE CVE-2008-3792
CVE CVE-2008-3831
CVE CVE-2008-3915
CVE CVE-2008-4113
CVE CVE-2008-4445
XREF USN:659-1
XREF CWE:20
XREF CWE:119

192.168.1.38 94
XREF CWE:189
XREF CWE:200
XREF CWE:264
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-21.43

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 95
42858 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : apache2 vulnerabilities (USN-860-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. If an attacker could
perform a man in the middle attack at the start of a TLS connection, the attacker could inject arbitrary
content at the beginning of the user's session. The flaw is with TLS renegotiation and potentially affects
any software that supports this feature. Attacks against the HTTPS protocol are known, with the severity of
the issue depending on the safeguards used in the web application. Until the TLS protocol and underlying
libraries are adjusted to defend against this vulnerability, a partial, temporary workaround has been
applied to Apache that disables client initiated TLS renegotiation. This update does not protect against
server initiated TLS renegotiation when using SSLVerifyClient and SSLCipherSuite on a per Directory or
Location basis. Users can defend againt server inititiated TLS renegotiation attacks by adjusting their
Apache configuration to use SSLVerifyClient and SSLCipherSuite only on the server or virtual host level.
(CVE-2009-3555)

It was discovered that mod_proxy_ftp in Apache did not properly sanitize its input when processing replies
to EPASV and PASV commands.
An attacker could use this to cause a denial of service in the Apache child process. (CVE-2009-3094)

Another flaw was discovered in mod_proxy_ftp. If Apache is configured as a reverse proxy, an attacker
could send a crafted HTTP header to bypass intended access controls and send arbitrary commands to the
FTP server. (CVE-2009-3095).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/860-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.0083

192.168.1.38 96
CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 36254
BID 36260
BID 36935
CVE CVE-2009-3094
CVE CVE-2009-3095
CVE CVE-2009-3555
XREF USN:860-1
XREF CWE:119
XREF CWE:264
XREF CWE:310

Plugin Information

Published: 2009/11/19, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.14

192.168.1.38 97
43026 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : linux, linux-source-2.6.15 vulnerabilities
(USN-864-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the AX.25 network subsystem did not correctly check integer signedness in certain
setsockopt calls. A local attacker could exploit this to crash the system, leading to a denial of service.
Ubuntu 9.10 was not affected. (CVE-2009-2909)

Jan Beulich discovered that the kernel could leak register contents to 32-bit processes that were switched
to 64-bit mode. A local attacker could run a specially crafted binary to read register values from an earlier
process, leading to a loss of privacy. (CVE-2009-2910)

Dave Jones discovered that the gdth SCSI driver did not correctly validate array indexes in certain ioctl calls.
A local attacker could exploit this to crash the system or gain elevated privileges.
(CVE-2009-3080)

Eric Dumazet and Jiri Pirko discovered that the TC and CLS subsystems would leak kernel memory via
uninitialized structure members. A local attacker could exploit this to read several bytes of kernel memory,
leading to a loss of privacy. (CVE-2009-3228, CVE-2009-3612)

Earl Chew discovered race conditions in pipe handling. A local attacker could exploit anonymous pipes via /
proc/*/fd/ and crash the system or gain root privileges. (CVE-2009-3547)

Dave Jones and Francois Romieu discovered that the r8169 network driver could be made to leak kernel
memory. A remote attacker could send a large number of jumbo frames until the system memory was
exhausted, leading to a denial of service. Ubuntu 9.10 was not affected. (CVE-2009-3613).

Ben Hutchings discovered that the ATI Rage 128 video driver did not correctly validate initialization
states. A local attacker could make specially crafted ioctl calls to crash the system or gain root privileges.
(CVE-2009-3620)

Tomoki Sekiyama discovered that Unix sockets did not correctly verify namespaces. A local attacker could
exploit this to cause a system hang, leading to a denial of service. (CVE-2009-3621)

J. Bruce Fields discovered that NFSv4 did not correctly use the credential cache. A local attacker using a
mount with AUTH_NULL authentication could exploit this to crash the system or gain root privileges. Only
Ubuntu 9.10 was affected. (CVE-2009-3623)

Alexander Zangerl discovered that the kernel keyring did not correctly reference count. A local attacker
could issue a series of specially crafted keyring calls to crash the system or gain root privileges.
Only Ubuntu 9.10 was affected. (CVE-2009-3624)

David Wagner discovered that KVM did not correctly bounds-check CPUID entries. A local attacker could
exploit this to crash the system or possibly gain elevated privileges. Ubuntu 6.06 and 9.10 were not
affected. (CVE-2009-3638)

Avi Kivity discovered that KVM did not correctly check privileges when accessing debug registers. A local
attacker could exploit this to crash a host system from within a guest system, leading to a denial of service.
Ubuntu 6.06 and 9.10 were not affected. (CVE-2009-3722)

192.168.1.38 98
Philip Reisner discovered that the connector layer for uvesafb, pohmelfs, dst, and dm did not correctly
check capabilties. A local attacker could exploit this to crash the system or gain elevated privileges. Ubuntu
6.06 was not affected. (CVE-2009-3725)

Trond Myklebust discovered that NFSv4 clients did not robustly verify attributes. A malicious remote NFSv4
server could exploit this to crash a client or gain root privileges. Ubuntu 9.10 was not affected.
(CVE-2009-3726)

Robin Getz discovered that NOMMU systems did not correctly validate NULL pointers in do_mmap_pgoff
calls. A local attacker could attempt to allocate large amounts of memory to crash the system, leading to a
denial of service. Only Ubuntu 6.06 and 9.10 were affected.
(CVE-2009-3888)

Joseph Malicki discovered that the MegaRAID SAS driver had world-writable option files. A local attacker
could exploit these to disrupt the behavior of the controller, leading to a denial of service. (CVE-2009-3889,
CVE-2009-3939)

Roel Kluin discovered that the Hisax ISDN driver did not correctly check the size of packets. A remote
attacker could send specially crafted packets to cause a system crash, leading to a denial of service.
(CVE-2009-4005)

Lennert Buytenhek discovered that certain 802.11 states were not handled correctly. A physically-
proximate remote attacker could send specially crafted wireless traffic that would crash the system, leading
to a denial of service. Only Ubuntu 9.10 was affected.
(CVE-2009-4026, CVE-2009-4027).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/864-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

9.0

EPSS Score

0.0731

CVSS v2.0 Base Score

192.168.1.38 99
7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.8 (CVSS2#E:H/RL:OF/RC:C)

References

BID 36304
BID 36576
BID 36635
BID 36706
BID 36723
BID 36793
BID 36803
BID 36824
BID 36827
BID 36901
BID 36936
BID 37019
BID 37036
BID 37068
BID 37170
BID 37221
CVE CVE-2009-2909
CVE CVE-2009-2910
CVE CVE-2009-3080
CVE CVE-2009-3228
CVE CVE-2009-3547
CVE CVE-2009-3612
CVE CVE-2009-3613
CVE CVE-2009-3620
CVE CVE-2009-3621
CVE CVE-2009-3623
CVE CVE-2009-3624
CVE CVE-2009-3638
CVE CVE-2009-3722
CVE CVE-2009-3725
CVE CVE-2009-3726
CVE CVE-2009-3888
CVE CVE-2009-3889
CVE CVE-2009-3939
CVE CVE-2009-4005
CVE CVE-2009-4026

192.168.1.38 100
CVE CVE-2009-4027
XREF USN:864-1
XREF CWE:20
XREF CWE:119
XREF CWE:189
XREF CWE:200
XREF CWE:264
XREF CWE:287
XREF CWE:310
XREF CWE:362
XREF CWE:399

Exploitable With

CANVAS (true)

Plugin Information

Published: 2009/12/07, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-26.64

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 101
44585 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : mysql-dfsg-5.0, mysql-dfsg-5.1
vulnerabilities (USN-897-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that MySQL could be made to overwrite existing table files in the data directory. An
authenticated user could use the DATA DIRECTORY and INDEX DIRECTORY options to possibly bypass
privilege checks. This update alters table creation behaviour by disallowing the use of the MySQL data
directory in DATA DIRECTORY and INDEX DIRECTORY options. This issue only affected Ubuntu 8.10.
(CVE-2008-4098)

It was discovered that MySQL contained a cross-site scripting vulnerability in the command-line client when
the --html option is enabled. An attacker could place arbitrary web script or html in a database cell, which
would then get placed in the html document output by the command-line tool. This issue only affected
Ubuntu 6.06 LTS, 8.04 LTS, 8.10 and 9.04. (CVE-2008-4456)

It was discovered that MySQL could be made to overwrite existing table files in the data directory. An
authenticated user could use symlinks combined with the DATA DIRECTORY and INDEX DIRECTORY options
to possibly bypass privilege checks. This issue only affected Ubuntu 9.10. (CVE-2008-7247)

It was discovered that MySQL contained multiple format string flaws when logging database creation and
deletion. An authenticated user could use specially crafted database names to make MySQL crash, causing
a denial of service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 8.10 and 9.04. (CVE-2009-2446)

It was discovered that MySQL incorrectly handled errors when performing certain SELECT statements,
and did not preserve correct flags when performing statements that use the GeomFromWKB function. An
authenticated user could exploit this to make MySQL crash, causing a denial of service. (CVE-2009-4019)

It was discovered that MySQL incorrectly checked symlinks when using the DATA DIRECTORY and INDEX
DIRECTORY options. A local user could use symlinks to create tables that pointed to tables known to be
created at a later time, bypassing access restrictions. (CVE-2009-4030)

It was discovered that MySQL contained a buffer overflow when parsing ssl certificates. A remote attacker
could send crafted requests and cause a denial of service or possibly execute arbitrary code. This issue
did not affect Ubuntu 6.06 LTS and the default compiler options for affected releases should reduce
the vulnerability to a denial of service. In the default installation, attackers would also be isolated by the
AppArmor MySQL profile. (CVE-2009-4484).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/897-1/

Solution

Update the affected packages.

192.168.1.38 102
Risk Factor

High

VPR Score

7.4

EPSS Score

0.9716

CVSS v2.0 Base Score

8.5 (CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.0 (CVSS2#E:F/RL:OF/RC:C)

References

BID 29106
BID 31486
BID 35609
BID 37075
BID 37297
BID 37640
BID 37943
BID 38043
CVE CVE-2008-4098
CVE CVE-2008-4456
CVE CVE-2008-7247
CVE CVE-2009-2446
CVE CVE-2009-4019
CVE CVE-2009-4030
CVE CVE-2009-4484
XREF USN:897-1
XREF CWE:59
XREF CWE:79
XREF CWE:119
XREF CWE:134

Exploitable With

Core Impact (true) Metasploit (true)

192.168.1.38 103
Plugin Information

Published: 2010/02/11, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libmysqlclient15off_5.0.51a-3ubuntu5


- Fixed package : libmysqlclient15off_5.0.51a-3ubuntu5.5

- Installed package : mysql-client-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-client-5.0_5.0.51a-3ubuntu5.5

- Installed package : mysql-common_5.0.51a-3ubuntu5


- Fixed package : mysql-common_5.0.51a-3ubuntu5.5

- Installed package : mysql-server_5.0.51a-3ubuntu5


- Fixed package : mysql-server_5.0.51a-3ubuntu5.5

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.51a-3ubuntu5.5

192.168.1.38 104
40655 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : apache2 regression (USN-802-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-802-1 fixed vulnerabilities in Apache. The upstream fix for CVE-2009-1891 introduced a regression
that would cause Apache children to occasionally segfault when mod_deflate is used. This update fixes the
problem.

We apologize for the inconvenience.

It was discovered that mod_proxy_http did not properly handle a large amount of streamed data when
used as a reverse proxy. A remote attacker could exploit this and cause a denial of service via memory
resource consumption. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04. (CVE-2009-1890)

It was discovered that mod_deflate did not abort compressing large files when the connection was
closed. A remote attacker could exploit this and cause a denial of service via CPU resource consumption.
(CVE-2009-1891).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/802-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.4

EPSS Score

0.021

CVSS v2.0 Base Score

7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)

192.168.1.38 105
References

CVE CVE-2009-1890
CVE CVE-2009-1891
XREF USN:802-2
XREF CWE:189
XREF CWE:399

Plugin Information

Published: 2009/08/20, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.11

192.168.1.38 106
39371 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : apache2 vulnerabilities (USN-787-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Matthew Palmer discovered an underflow flaw in apr-util as included in Apache. An attacker could cause a
denial of service via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or
when using mod_apreq2. This issue only affected Ubuntu 6.06 LTS. (CVE-2009-0023)

Sander de Boer discovered that mod_proxy_ajp would reuse connections when a client closed a connection
without sending a request body. A remote attacker could exploit this to obtain sensitive response data.
This issue only affected Ubuntu 9.04. (CVE-2009-1191)

Jonathan Peatfield discovered that Apache did not process Includes options correctly. With certain
configurations of Options and AllowOverride, a local attacker could use an .htaccess file to override
intended restrictions and execute arbitrary code via a Server-Side-Include file. This issue affected Ubuntu
8.04 LTS, 8.10 and 9.04. (CVE-2009-1195)

It was discovered that the XML parser did not properly handle entity expansion. A remote attacker
could cause a denial of service via memory resource consumption by sending a crafted request to an
Apache server configured to use mod_dav or mod_dav_svn. This issue only affected Ubuntu 6.06 LTS.
(CVE-2009-1955)

C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For
big-endian machines (powerpc, hppa and sparc in Ubuntu), a remote attacker could cause a denial of
service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk.
This issue only affected Ubuntu 6.06 LTS. (CVE-2009-1956).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/787-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.0

192.168.1.38 107
EPSS Score

0.389

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.8 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 34663
BID 35115
BID 35221
BID 35251
BID 35253
CVE CVE-2009-0023
CVE CVE-2009-1191
CVE CVE-2009-1195
CVE CVE-2009-1955
CVE CVE-2009-1956
XREF USN:787-1
XREF CWE:16
XREF CWE:20
XREF CWE:119
XREF CWE:189
XREF CWE:399

Plugin Information

Published: 2009/06/12, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.8

192.168.1.38 108
39789 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : apache2 vulnerabilities (USN-802-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that mod_proxy_http did not properly handle a large amount of streamed data when
used as a reverse proxy. A remote attacker could exploit this and cause a denial of service via memory
resource consumption. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04. (CVE-2009-1890)

It was discovered that mod_deflate did not abort compressing large files when the connection was closed.
A remote attacker could exploit this and cause a denial of service via CPU resource consumption.
(CVE-2009-1891).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/802-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.4

EPSS Score

0.021

CVSS v2.0 Base Score

7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.2 (CVSS2#E:H/RL:OF/RC:C)

References

192.168.1.38 109
BID 35565
BID 35623
CVE CVE-2009-1890
CVE CVE-2009-1891
XREF USN:802-1
XREF CWE:189
XREF CWE:399

Plugin Information

Published: 2009/07/14, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.10

192.168.1.38 110
38984 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : cron vulnerability (USN-778-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that cron did not properly check the return code of the setgid() and initgroups() system
calls. A local attacker could use this to escalate group privileges. Please note that cron versions 3.0pl1-64
and later were already patched to address the more serious setuid() check referred to by CVE-2006-2607.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/778-1/

Solution

Update the affected cron package.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0013

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2006-2607
XREF USN:778-1

Plugin Information

Published: 2009/06/02, Modified: 2021/01/19

192.168.1.38 111
Plugin Output

tcp/0

- Installed package : cron_3.0pl1-100ubuntu2


- Fixed package : cron_3.0pl1-100ubuntu2.1

192.168.1.38 112
40657 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : curl vulnerability (USN-818-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Scott Cantor discovered that Curl did not correctly handle SSL certificates with zero bytes in the Common
Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive
information or alter encrypted communications.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/818-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

3.6

EPSS Score

0.0015

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

References

BID 36032
CVE CVE-2009-2417
XREF USN:818-1

192.168.1.38 113
XREF CWE:310

Plugin Information

Published: 2009/08/20, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libcurl3-gnutls_7.18.0-1ubuntu2


- Fixed package : libcurl3-gnutls_7.18.0-1ubuntu2.2

192.168.1.38 114
39515 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : cyrus-sasl2 vulnerability (USN-790-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

James Ralston discovered that the Cyrus SASL base64 encoding function could be used unsafely. If a
remote attacker sent a specially crafted request to a service that used SASL, it could lead to a loss of
privacy, or crash the application, resulting in a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/790-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.3939

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-2009-0688
XREF USN:790-1
XREF CWE:119

Plugin Information

Published: 2009/06/25, Modified: 2021/01/19

192.168.1.38 115
Plugin Output

tcp/0

- Installed package : libsasl2-2_2.1.22.dfsg1-18ubuntu2


- Fixed package : libsasl2-2_2.1.22.dfsg1-18ubuntu2.1

- Installed package : libsasl2-modules_2.1.22.dfsg1-18ubuntu2


- Fixed package : libsasl2-modules_2.1.22.dfsg1-18ubuntu2.1

192.168.1.38 116
40656 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : gnutls12, gnutls13, gnutls26 vulnerabilities
(USN-809-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Moxie Marlinspike and Dan Kaminsky independently discovered that GnuTLS did not properly handle
certificates with NULL characters in the certificate name. An attacker could exploit this to perform a man in
the middle attack to view sensitive information or alter encrypted communications. (CVE-2009-2730)

Dan Kaminsky discovered GnuTLS would still accept certificates with MD2 hash signatures. As a result, an
attacker could potentially create a malicious trusted certificate to impersonate another site. This issue only
affected Ubuntu 6.06 LTS and Ubuntu 8.10. (CVE-2009-2409)

USN-678-1 fixed a vulnerability and USN-678-2 a regression in GnuTLS.


The upstream patches introduced a regression when validating certain certificate chains that would report
valid certificates as untrusted.
This update fixes the problem, and only affected Ubuntu 6.06 LTS and Ubuntu 8.10 (Ubuntu 8.04 LTS and
9.04 were fixed at an earlier date).
In an effort to maintain a strong security stance and address all known regressions, this update deprecates
X.509 validation chains using MD2 and MD5 signatures. To accomodate sites which must still use a
deprected RSA-MD5 certificate, GnuTLS has been updated to stop looking when it has found a trusted
intermediary certificate. This new handling of intermediary certificates is in accordance with other SSL
implementations.

Martin von Gagern discovered that GnuTLS did not properly verify certificate chains when the last
certificate in the chain was self-signed. If a remote attacker were able to perform a man-in-the-middle
attack, this flaw could be exploited to view sensitive information. (CVE-2008-4989).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/809-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

192.168.1.38 117
EPSS Score

0.0137

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

References

BID 35952
CVE CVE-2008-4989
CVE CVE-2009-2409
CVE CVE-2009-2730
XREF USN:809-1
XREF CWE:255
XREF CWE:310

Plugin Information

Published: 2009/08/20, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libgnutls13_2.0.4-1ubuntu2


- Fixed package : libgnutls13_2.0.4-1ubuntu2.6

192.168.1.38 118
39586 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : linux, linux-source-2.6.15 vulnerabilities
(USN-793-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Igor Zhbanov discovered that NFS clients were able to create device nodes even when root_squash was
enabled. An authenticated remote attacker could create device nodes with open permissions, leading to a
loss of privacy or escalation of privileges. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1072)

Dan Carpenter discovered that SELinux did not correctly handle certain network checks when running with
compat_net=1. A local attacker could exploit this to bypass network checks. Default Ubuntu installations do
not enable SELinux, and only Ubuntu 8.10 and 9.04 were affected.
(CVE-2009-1184)

Shaohua Li discovered that memory was not correctly initialized in the AGP subsystem. A local attacker
could potentially read kernel memory, leading to a loss of privacy. (CVE-2009-1192)

Benjamin Gilbert discovered that the VMX implementation of KVM did not correctly handle certain
registers. An attacker in a guest VM could exploit this to cause a host system crash, leading to a denial of
service. This only affected 32bit hosts. Ubuntu 6.06 was not affected.
(CVE-2009-1242)

Thomas Pollet discovered that the Amateur Radio X.25 Packet Layer Protocol did not correctly validate
certain fields. A remote attacker could exploit this to read kernel memory, leading to a loss of privacy.
(CVE-2009-1265)

Trond Myklebust discovered that NFS did not correctly handle certain long filenames. An authenticated
remote attacker could exploit this to cause a system crash, leading to a denial of service. Only Ubuntu 6.06
was affected. (CVE-2009-1336)

Oleg Nesterov discovered that the kernel did not correctly handle CAP_KILL. A local user could exploit this
to send signals to arbitrary processes, leading to a denial of service. (CVE-2009-1337)

Daniel Hokka Zakrisson discovered that signal handling was not correctly limited to process namespaces.
A local user could bypass namespace restrictions, possibly leading to a denial of service. Only Ubuntu 8.04
was affected. (CVE-2009-1338)

Pavel Emelyanov discovered that network namespace support for IPv6 was not correctly handled. A remote
attacker could send specially crafted IPv6 traffic that would cause a system crash, leading to a denial of
service. Only Ubuntu 8.10 and 9.04 were affected. (CVE-2009-1360)

Neil Horman discovered that the e1000 network driver did not correctly validate certain fields. A remote
attacker could send a specially crafted packet that would cause a system crash, leading to a denial of
service. (CVE-2009-1385)

Pavan Naregundi discovered that CIFS did not correctly check lengths when handling certain mount
requests. A remote attacker could send specially crafted traffic to cause a system crash, leading to a denial
of service. (CVE-2009-1439)

192.168.1.38 119
Simon Vallet and Frank Filz discovered that execute permissions were not correctly handled by NFSv4.
A local user could bypass permissions and run restricted programs, possibly leading to an escalation of
privileges. (CVE-2009-1630)

Jeff Layton and Suresh Jayaraman discovered buffer overflows in the CIFS client code. A malicious remote
server could exploit this to cause a system crash or execute arbitrary code as root.
(CVE-2009-1633)

Mikulas Patocka discovered that /proc/iomem was not correctly initialized on Sparc. A local attacker
could use this file to crash the system, leading to a denial of service. Ubuntu 6.06 was not affected.
(CVE-2009-1914)

Miklos Szeredi discovered that OCFS2 did not correctly handle certain splice operations. A local attacker
could exploit this to cause a system hang, leading to a denial of service. Ubuntu 6.06 was not affected.
(CVE-2009-1961).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/793-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.9663

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.8 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 34205

192.168.1.38 120
BID 34405
BID 34453
BID 34612
BID 34654
BID 34673
BID 34934
BID 35143
BID 35185
CVE CVE-2009-1072
CVE CVE-2009-1184
CVE CVE-2009-1192
CVE CVE-2009-1242
CVE CVE-2009-1265
CVE CVE-2009-1336
CVE CVE-2009-1337
CVE CVE-2009-1338
CVE CVE-2009-1360
CVE CVE-2009-1385
CVE CVE-2009-1439
CVE CVE-2009-1630
CVE CVE-2009-1633
CVE CVE-2009-1914
CVE CVE-2009-1961
XREF USN:793-1
XREF CWE:16
XREF CWE:20
XREF CWE:119
XREF CWE:189
XREF CWE:264
XREF CWE:362

Plugin Information

Published: 2009/07/02, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-24.55

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may

192.168.1.38 121
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 122
40416 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : linux, linux-source-2.6.15 vulnerabilities
(USN-807-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Michael Tokarev discovered that the RTL8169 network driver did not correctly validate buffer sizes. A
remote attacker on the local network could send specially crafted traffic that would crash the system or
potentially grant elevated privileges. (CVE-2009-1389)

Julien Tinnes and Tavis Ormandy discovered that when executing setuid processes the kernel did not clear
certain personality flags. A local attacker could exploit this to map the NULL memory page, causing other
vulnerabilities to become exploitable. Ubuntu 6.06 was not affected.
(CVE-2009-1895)

Matt T. Yourst discovered that KVM did not correctly validate the page table root. A local attacker could
exploit this to crash the system, leading to a denial of service. Ubuntu 6.06 was not affected.
(CVE-2009-2287)

Ramon de Carvalho Valle discovered that eCryptfs did not correctly validate certain buffer sizes. A local
attacker could create specially crafted eCryptfs files to crash the system or gain elevated privileges. Ubuntu
6.06 was not affected. (CVE-2009-2406, CVE-2009-2407).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/807-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.1036

192.168.1.38 123
CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.8 (CVSS2#E:U/RL:OF/RC:C)

References

BID 35281
BID 35529
BID 35647
CVE CVE-2009-1389
CVE CVE-2009-1895
CVE CVE-2009-2287
CVE CVE-2009-2406
CVE CVE-2009-2407
XREF USN:807-1
XREF CWE:16
XREF CWE:20
XREF CWE:119

Plugin Information

Published: 2009/07/29, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-24.57

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 124
42209 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : linux, linux-source-2.6.15 vulnerabilities
(USN-852-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Solar Designer discovered that the z90crypt driver did not correctly check capabilities. A local attacker could
exploit this to shut down the device, leading to a denial of service. Only affected Ubuntu 6.06.
(CVE-2009-1883)

Michael Buesch discovered that the SGI GRU driver did not correctly check the length when setting options.
A local attacker could exploit this to write to the kernel stack, leading to root privilege escalation or a denial
of service. Only affected Ubuntu 8.10 and 9.04.
(CVE-2009-2584)

It was discovered that SELinux did not fully implement the mmap_min_addr restrictions. A local attacker
could exploit this to allocate the NULL memory page which could lead to further attacks against kernel
NULL-dereference vulnerabilities. Ubuntu 6.06 was not affected. (CVE-2009-2695)

Cagri Coltekin discovered that the UDP stack did not correctly handle certain flags. A local user could send
specially crafted commands and traffic to gain root privileges or crash the systeam, leading to a denial of
service. Only affected Ubuntu 6.06. (CVE-2009-2698)

Hiroshi Shimamoto discovered that monotonic timers did not correctly validate parameters. A local user
could make a specially crafted timer request to gain root privileges or crash the system, leading to a denial
of service. Only affected Ubuntu 9.04. (CVE-2009-2767)

Michael Buesch discovered that the HPPA ISA EEPROM driver did not correctly validate positions. A local
user could make a specially crafted request to gain root privileges or crash the system, leading to a denial
of service. (CVE-2009-2846)

Ulrich Drepper discovered that kernel signal stacks were not being correctly padded on 64-bit systems. A
local attacker could send specially crafted calls to expose 4 bytes of kernel stack memory, leading to a loss
of privacy. (CVE-2009-2847)

Jens Rosenboom discovered that the clone method did not correctly clear certain fields. A local attacker
could exploit this to gain privileges or crash the system, leading to a denial of service.
(CVE-2009-2848)

It was discovered that the MD driver did not check certain sysfs files. A local attacker with write access to /
sys could exploit this to cause a system crash, leading to a denial of service. Ubuntu 6.06 was not affected.
(CVE-2009-2849)

Mark Smith discovered that the AppleTalk stack did not correctly manage memory. A remote attacker could
send specially crafted traffic to cause the system to consume all available memory, leading to a denial of
service. (CVE-2009-2903)

Loic Minier discovered that eCryptfs did not correctly handle writing to certain deleted files. A local attacker
could exploit this to gain root privileges or crash the system, leading to a denial of service.
Ubuntu 6.06 was not affected. (CVE-2009-2908)

192.168.1.38 125
It was discovered that the LLC, AppleTalk, IR, EConet, Netrom, and ROSE network stacks did not correctly
initialize their data structures. A local attacker could make specially crafted calls to read kernel memory,
leading to a loss of privacy. (CVE-2009-3001, CVE-2009-3002)

It was discovered that the randomization used for Address Space Layout Randomization was predictable
within a small window of time. A local attacker could exploit this to leverage further attacks that require
knowledge of userspace memory layouts. (CVE-2009-3238)

Eric Paris discovered that NFSv4 did not correctly handle file creation failures. An attacker with write access
to an NFSv4 share could exploit this to create files with arbitrary mode bits, leading to privilege escalation
or a loss of privacy. (CVE-2009-3286)

Bob Tracy discovered that the SCSI generic driver did not correctly use the right index for array access.
A local attacker with write access to a CDR could exploit this to crash the system, leading to a denial of
service. Only Ubuntu 9.04 was affected. (CVE-2009-3288)

Jan Kiszka discovered that KVM did not correctly validate certain hypercalls. A local unprivileged attacker in
a virtual guest could exploit this to crash the guest kernel, leading to a denial of service. Ubuntu 6.06 was
not affected. (CVE-2009-3290).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/852-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

9.0

EPSS Score

0.0277

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS v2.0 Temporal Score

6.8 (CVSS2#E:H/RL:OF/RC:C)

192.168.1.38 126
References

BID 35930
BID 36004
BID 36108
BID 36176
BID 36379
BID 36472
BID 36512
BID 36639
CVE CVE-2009-1883
CVE CVE-2009-2584
CVE CVE-2009-2695
CVE CVE-2009-2698
CVE CVE-2009-2767
CVE CVE-2009-2846
CVE CVE-2009-2847
CVE CVE-2009-2848
CVE CVE-2009-2849
CVE CVE-2009-2903
CVE CVE-2009-2908
CVE CVE-2009-3001
CVE CVE-2009-3002
CVE CVE-2009-3238
CVE CVE-2009-3286
CVE CVE-2009-3288
CVE CVE-2009-3290
XREF USN:852-1
XREF CWE:119
XREF CWE:189
XREF CWE:200
XREF CWE:264
XREF CWE:310
XREF CWE:399

Exploitable With

Core Impact (true)

Plugin Information

Published: 2009/10/22, Modified: 2021/01/19

Plugin Output

192.168.1.38 127
tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-25.63

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 128
40658 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : linux, linux-source-2.6.15 vulnerability
(USN-819-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Tavis Ormandy and Julien Tinnes discovered that Linux did not correctly initialize certain socket operation
function pointers. A local attacker could exploit this to gain root privileges. By default, Ubuntu 8.04 and
later with a non-zero /proc/sys/vm/mmap_min_addr setting were not vulnerable.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/819-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

9.6

EPSS Score

0.0005

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.3 (CVSS2#E:H/RL:OF/RC:C)

References

BID 36038
CVE CVE-2009-2692

192.168.1.38 129
XREF USN:819-1
XREF CWE:119

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2009/08/20, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-24.59

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 130
41968 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : samba vulnerabilities (USN-839-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

J. David Hester discovered that Samba incorrectly handled users that lack home directories when the
automated [homes] share is enabled. An authenticated user could connect to that share name and gain
access to the whole filesystem. (CVE-2009-2813)

Tim Prouty discovered that the smbd daemon in Samba incorrectly handled certain unexpected network
replies. A remote attacker could send malicious replies to the server and cause smbd to use all available
CPU, leading to a denial of service. (CVE-2009-2906)

Ronald Volgers discovered that the mount.cifs utility, when installed as a setuid program, would not
verify user permissions before opening a credentials file. A local user could exploit this to use or read the
contents of unauthorized credential files. (CVE-2009-2948)

Reinhard Nissl discovered that the smbclient utility contained format string vulnerabilities in its file name
handling. Because of security features in Ubuntu, exploitation of this vulnerability is limited. If a user or
automated system were tricked into processing a specially crafted file name, smbclient could be made to
crash, possibly leading to a denial of service. This only affected Ubuntu 8.10.
(CVE-2009-1886)

Jeremy Allison discovered that the smbd daemon in Samba incorrectly handled permissions to modify
access control lists when dos filemode is enabled. A remote attacker could exploit this to modify access
control lists. This only affected Ubuntu 8.10 and Ubuntu 9.04.
(CVE-2009-1886).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/839-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

192.168.1.38 131
EPSS Score

0.0174

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 36363
BID 36572
BID 36573
CVE CVE-2009-1886
CVE CVE-2009-1888
CVE CVE-2009-2813
CVE CVE-2009-2906
CVE CVE-2009-2948
XREF USN:839-1
XREF CWE:134
XREF CWE:264

Plugin Information

Published: 2009/10/02, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.9

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.9

192.168.1.38 132
48361 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : freetype vulnerabilities (USN-972-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked
into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute
arbitrary code with user privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/972-1/

Solution

Update the affected freetype2-demos, libfreetype6 and / or libfreetype6-dev packages.

Risk Factor

High

VPR Score

9.2

EPSS Score

0.536

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.1 (CVSS2#E:H/RL:OF/RC:C)

References

BID 42241
BID 42285
BID 60740

192.168.1.38 133
CVE CVE-2010-1797
CVE CVE-2010-2541
CVE CVE-2010-2805
CVE CVE-2010-2806
CVE CVE-2010-2807
CVE CVE-2010-2808
XREF USN:972-1

Exploitable With

CANVAS (true) Core Impact (true)

Plugin Information

Published: 2010/08/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libfreetype6_2.3.5-1ubuntu4.8.04.2


- Fixed package : libfreetype6_2.3.5-1ubuntu4.8.04.4

192.168.1.38 134
46731 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : glibc, eglibc vulnerabilities (USN-944-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Maksymilian Arciemowicz discovered that the GNU C library did not correctly handle integer overflows in
the strfmon function. If a user or automated system were tricked into processing a specially crafted format
string, a remote attacker could crash applications, leading to a denial of service. (Ubuntu 10.04 was not
affected.) (CVE-2008-1391)

Jeff Layton and Dan Rosenberg discovered that the GNU C library did not correctly handle newlines in the
mntent family of functions. If a local attacker were able to inject newlines into a mount entry through other
vulnerable mount helpers, they could disrupt the system or possibly gain root privileges. (CVE-2010-0296)

Dan Rosenberg discovered that the GNU C library did not correctly validate certain ELF program headers. If
a user or automated system were tricked into verifying a specially crafted ELF program, a remote attacker
could execute arbitrary code with user privileges.
(CVE-2010-0830).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/944-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0938

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

192.168.1.38 135
CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 36443
BID 40063
CVE CVE-2008-1391
CVE CVE-2009-4880
CVE CVE-2010-0296
CVE CVE-2010-0830
XREF USN:944-1
XREF CWE:189

Plugin Information

Published: 2010/05/26, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libc6_2.7-10ubuntu5


- Fixed package : libc6_2.7-10ubuntu6

- Installed package : libc6-dev_2.7-10ubuntu5


- Fixed package : libc6-dev_2.7-10ubuntu6

- Installed package : libc6-i686_2.7-10ubuntu5


- Fixed package : libc6-i686_2.7-10ubuntu6

192.168.1.38 136
47695 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : libpng vulnerabilities (USN-960-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that libpng did not properly handle certain malformed PNG images. If a user or
automated system were tricked into opening a crafted PNG file, an attacker could cause a denial of service
or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2010-1205)

It was discovered that libpng did not properly handle certain malformed PNG images. If a user or
automated system were tricked into processing a crafted PNG image, an attacker could possibly use this
flaw to consume all available resources, resulting in a denial of service. (CVE-2010-2249).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/960-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.7021

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

192.168.1.38 137
BID 41174
CVE CVE-2010-1205
CVE CVE-2010-2249
XREF USN:960-1

Plugin Information

Published: 2010/07/09, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpng12-0_1.2.15~beta5-3ubuntu0.2


- Fixed package : libpng12-0_1.2.15~beta5-3ubuntu0.3

192.168.1.38 138
46810 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : linux, linux-source-2.6.15
vulnerabilities (USN-947-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the Linux kernel did not correctly handle memory protection of the Virtual Dynamic
Shared Object page when running a 32-bit application on a 64-bit kernel. A local attacker could exploit this
to cause a denial of service. (Only affected Ubuntu 6.06 LTS.) (CVE-2009-4271)

It was discovered that the r8169 network driver did not correctly check the size of Ethernet frames. A
remote attacker could send specially crafted traffic to crash the system, leading to a denial of service.
(CVE-2009-4537)

Wei Yongjun discovered that SCTP did not correctly validate certain chunks. A remote attacker could send
specially crafted traffic to monopolize CPU resources, leading to a denial of service. (Only affected Ubuntu
6.06 LTS.) (CVE-2010-0008)

It was discovered that KVM did not correctly limit certain privileged IO accesses on x86. Processes in the
guest OS with access to IO regions could gain further privileges within the guest OS. (Did not affect Ubuntu
6.06 LTS.) (CVE-2010-0298, CVE-2010-0306, CVE-2010-0419)

Evgeniy Polyakov discovered that IPv6 did not correctly handle certain TUN packets. A remote attacker
could exploit this to crash the system, leading to a denial of service. (Only affected Ubuntu 8.04 LTS.)
(CVE-2010-0437)

Sachin Prabhu discovered that GFS2 did not correctly handle certain locks. A local attacker with write access
to a GFS2 filesystem could exploit this to crash the system, leading to a denial of service.
(CVE-2010-0727)

Jamie Strandboge discovered that network virtio in KVM did not correctly handle certain high-traffic
conditions. A remote attacker could exploit this by sending specially crafted traffic to a guest OS, causing
the guest to crash, leading to a denial of service. (Only affected Ubuntu 8.04 LTS.) (CVE-2010-0741)

Marcus Meissner discovered that the USB subsystem did not correctly handle certain error conditions. A
local attacker with access to a USB device could exploit this to read recently used kernel memory, leading to
a loss of privacy and potentially root privilege escalation.
(CVE-2010-1083)

Neil Brown discovered that the Bluetooth subsystem did not correctly handle large amounts of traffic.
A physically proximate remote attacker could exploit this by sending specially crafted traffic that would
consume all available system memory, leading to a denial of service. (Ubuntu 6.06 LTS and 10.04 LTS were
not affected.) (CVE-2010-1084)

Jody Bruchon discovered that the sound driver for the AMD780V did not correctly handle certain
conditions. A local attacker with access to this hardward could exploit the flaw to cause a system crash,
leading to a denial of service. (CVE-2010-1085)

Ang Way Chuang discovered that the DVB driver did not correctly handle certain MPEG2-TS frames. An
attacker could exploit this by delivering specially crafted frames to monopolize CPU resources, leading to a
denial of service. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1086)

192.168.1.38 139
Trond Myklebust discovered that NFS did not correctly handle truncation under certain conditions. A local
attacker with write access to an NFS share could exploit this to crash the system, leading to a denial of
service. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1087)

Al Viro discovered that automount of NFS did not correctly handle symlinks under certain conditions. A
local attacker could exploit this to crash the system, leading to a denial of service. (Ubuntu 6.06 LTS and
Ubuntu 10.04 LTS were not affected.) (CVE-2010-1088)

Matt McCutchen discovered that ReiserFS did not correctly protect xattr files in the .reiserfs_priv directory.
A local attacker could exploit this to gain root privileges or crash the system, leading to a denial of service.
(CVE-2010-1146)

Eugene Teo discovered that CIFS did not correctly validate arguments when creating new files. A local
attacker could exploit this to crash the system, leading to a denial of service, or possibly gain root privileges
if mmap_min_addr was not set. (CVE-2010-1148)

Catalin Marinas and Tetsuo Handa discovered that the TTY layer did not correctly release process IDs. A
local attacker could exploit this to consume kernel resources, leading to a denial of service.
(CVE-2010-1162)

Neil Horman discovered that TIPC did not correctly check its internal state. A local attacker could send
specially crafted packets via AF_TIPC that would cause the system to crash, leading to a denial of service.
(Ubuntu 6.06 LTS was not affected.) (CVE-2010-1187)

Masayuki Nakagawa discovered that IPv6 did not correctly handle certain settings when listening. If a
socket were listening with the IPV6_RECVPKTINFO flag, a remote attacker could send specially crafted traffic
that would cause the system to crash, leading to a denial of service. (Only Ubuntu 6.06 LTS was affected.)
(CVE-2010-1188)

Oleg Nesterov discovered that the Out-Of-Memory handler did not correctly handle certain arrangements
of processes. A local attacker could exploit this to crash the system, leading to a denial of service.
(CVE-2010-1488).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/947-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

7.3

192.168.1.38 140
EPSS Score

0.2222

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 37521
BID 38185
BID 38348
BID 38479
BID 38857
BID 38858
BID 38898
BID 39016
BID 39042
BID 39044
BID 39101
BID 39120
BID 39186
BID 39344
BID 39480
BID 39569
CVE CVE-2009-4271
CVE CVE-2009-4537
CVE CVE-2010-0008
CVE CVE-2010-0298
CVE CVE-2010-0306
CVE CVE-2010-0419
CVE CVE-2010-0437
CVE CVE-2010-0727
CVE CVE-2010-0741
CVE CVE-2010-1083
CVE CVE-2010-1084
CVE CVE-2010-1085
CVE CVE-2010-1086
CVE CVE-2010-1087
CVE CVE-2010-1088

192.168.1.38 141
CVE CVE-2010-1146
CVE CVE-2010-1148
CVE CVE-2010-1162
CVE CVE-2010-1187
CVE CVE-2010-1188
CVE CVE-2010-1488
XREF USN:947-1
XREF CWE:20
XREF CWE:264

Plugin Information

Published: 2010/06/04, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.70

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.70

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 142
49283 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : linux, linux-source-2.6.15
vulnerabilities (USN-988-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Ben Hawkes discovered that the Linux kernel did not correctly validate memory ranges on 64bit kernels
when allocating memory on behalf of 32bit system calls. On a 64bit system, a local attacker could perform
malicious multicast getsockopt calls to gain root privileges.
(CVE-2010-3081)

Ben Hawkes discovered that the Linux kernel did not correctly filter registers on 64bit kernels when
performing 32bit system calls. On a 64bit system, a local attacker could manipulate 32bit system calls to
gain root privileges. (Ubuntu 6.06 LTS and 8.04 LTS were not affected.) (CVE-2010-3301).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/988-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

9.6

EPSS Score

0.0004

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2010-3081

192.168.1.38 143
CVE CVE-2010-3301
XREF USN:988-1

Exploitable With

Core Impact (true)

Plugin Information

Published: 2010/09/20, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.79

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.79

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 144
48381 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : linux, linux-{ec2,fsl-imx51,mvl-
dove,source-2.6.15,ti-omap} vulnerabilities (USN-974-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory manager did not properly
handle when applications grow stacks into adjacent memory regions. A local attacker could exploit this to
gain control of certain applications, potentially leading to privilege escalation, as demonstrated in attacks
against the X server.
(CVE-2010-2240)

Kees Cook discovered that under certain situations the ioctl subsystem for DRM did not properly sanitize its
arguments. A local attacker could exploit this to read previously freed kernel memory, leading to a loss of
privacy. (CVE-2010-2803)

Ben Hawkes discovered an integer overflow in the Controller Area Network (CAN) subsystem when setting
up frame content and filtering certain messages. An attacker could send specially crafted CAN traffic to
crash the system or gain root privileges. (CVE-2010-2959).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/974-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

8.9

EPSS Score

0.0022

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

192.168.1.38 145
CVSS v2.0 Temporal Score

5.6 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 42505
BID 42577
CVE CVE-2010-2240
CVE CVE-2010-2803
CVE CVE-2010-2959
XREF USN:974-1

Plugin Information

Published: 2010/08/20, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.75

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.75

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 146
48253 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : linux, linux-{source-2.6.15,ec2,mvl-
dove,ti-omap} vulnerabilities (USN-966-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Junjiro R. Okajima discovered that knfsd did not correctly handle strict overcommit. A local attacker could
exploit this to crash knfsd, leading to a denial of service. (Only Ubuntu 6.06 LTS and 8.04 LTS were affected.)
(CVE-2008-7256, CVE-2010-1643)

Chris Guo, Jukka Taimisto, and Olli Jarva discovered that SCTP did not correctly handle invalid parameters.
A remote attacker could send specially crafted traffic that could crash the system, leading to a denial of
service. (CVE-2010-1173)

Mario Mikocevic discovered that GFS2 did not correctly handle certain quota structures. A local attacker
could exploit this to crash the system, leading to a denial of service. (Ubuntu 6.06 LTS was not affected.)
(CVE-2010-1436)

Toshiyuki Okajima discovered that the kernel keyring did not correctly handle dead keyrings. A local
attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-1437)

Brad Spengler discovered that Sparc did not correctly implement non-executable stacks. This made
userspace applications vulnerable to exploits that would have been otherwise blocked due to non-
executable memory protections. (Ubuntu 10.04 LTS was not affected.) (CVE-2010-1451)

Dan Rosenberg discovered that the btrfs clone function did not correctly validate permissions. A local
attacker could exploit this to read sensitive information, leading to a loss of privacy. (Only Ubuntu 9.10 was
affected.) (CVE-2010-1636)

Dan Rosenberg discovered that GFS2 set_flags function did not correctly validate permissions. A local
attacker could exploit this to gain access to files, leading to a loss of privacy and potential privilege
escalation. (Ubuntu 6.06 LTS was not affected.) (CVE-2010-1641)

Shi Weihua discovered that btrfs xattr_set_acl function did not correctly validate permissions. A local
attacker could exploit this to gain access to files, leading to a loss of privacy and potential privilege
escalation. (Only Ubuntu 9.10 and 10.04 LTS were affected.) (CVE-2010-2071)

Andre Osterhues discovered that eCryptfs did not correctly calculate hash values. A local attacker with
certain uids could exploit this to crash the system or potentially gain root privileges. (Ubuntu 6.06 LTS was
not affected.) (CVE-2010-2492).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/966-1/

Solution

192.168.1.38 147
Update the affected packages.

Risk Factor

High

VPR Score

8.5

EPSS Score

0.5728

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.6 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 38393
BID 39715
BID 39719
BID 39794
BID 40241
BID 40356
BID 40377
BID 41467
BID 42237
CVE CVE-2008-7256
CVE CVE-2010-1173
CVE CVE-2010-1436
CVE CVE-2010-1437
CVE CVE-2010-1451
CVE CVE-2010-1636
CVE CVE-2010-1641
CVE CVE-2010-1643
CVE CVE-2010-2071
CVE CVE-2010-2492
XREF USN:966-1

Plugin Information

192.168.1.38 148
Published: 2010/08/05, Modified: 2019/10/16

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.73

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.73

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 149
49306 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : php5 vulnerabilities (USN-989-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Auke van Slooten discovered that PHP incorrectly handled certain xmlrpc requests. An attacker could
exploit this issue to cause the PHP server to crash, resulting in a denial of service. This issue only affected
Ubuntu 6.06 LTS, 8.04 LTS, 9.04 and 9.10. (CVE-2010-0397)

It was discovered that the pseudorandom number generator in PHP did not provide the expected entropy.
An attacker could exploit this issue to predict values that were intended to be random, such as session
cookies. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.04 and 9.10. (CVE-2010-1128)

It was discovered that PHP did not properly handle directory pathnames that lacked a trailing slash
character. An attacker could exploit this issue to bypass safe_mode restrictions. This issue only affected
Ubuntu 6.06 LTS, 8.04 LTS, 9.04 and 9.10. (CVE-2010-1129)

Grzegorz Stachowiak discovered that the PHP session extension did not properly handle semicolon
characters. An attacker could exploit this issue to bypass safe_mode restrictions. This issue only affected
Ubuntu 8.04 LTS, 9.04 and 9.10. (CVE-2010-1130)

Stefan Esser discovered that PHP incorrectly decoded remote HTTP chunked encoding streams. An
attacker could exploit this issue to cause the PHP server to crash and possibly execute arbitrary code with
application privileges. This issue only affected Ubuntu 10.04 LTS.
(CVE-2010-1866)

Mateusz Kocielski discovered that certain PHP SQLite functions incorrectly handled empty SQL queries. An
attacker could exploit this issue to possibly execute arbitrary code with application privileges.
(CVE-2010-1868)

Mateusz Kocielski discovered that PHP incorrectly handled certain arguments to the fnmatch function. An
attacker could exploit this flaw and cause the PHP server to consume all available stack memory, resulting
in a denial of service. (CVE-2010-1917)

Stefan Esser discovered that PHP incorrectly handled certain strings in the phar extension. An attacker
could exploit this flaw to possibly view sensitive information. This issue only affected Ubuntu 10.04 LTS.
(CVE-2010-2094, CVE-2010-2950)

Stefan Esser discovered that PHP incorrectly handled deserialization of SPLObjectStorage objects. A remote
attacker could exploit this issue to view sensitive information and possibly execute arbitrary code with
application privileges. This issue only affected Ubuntu 8.04 LTS, 9.04, 9.10 and 10.04 LTS. (CVE-2010-2225)

It was discovered that PHP incorrectly filtered error messages when limits for memory, execution time, or
recursion were exceeded. A remote attacker could exploit this issue to possibly view sensitive information.
(CVE-2010-2531)

Stefan Esser discovered that the PHP session serializer incorrectly handled the PS_UNDEF_MARKER marker.
An attacker could exploit this issue to alter arbitrary session variables. (CVE-2010-3065).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

192.168.1.38 150
See Also

https://usn.ubuntu.com/989-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0352

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 38182
BID 38430
BID 38431
BID 38708
BID 39877
BID 40013
BID 40173
BID 40948
BID 41991
CVE CVE-2010-0397
CVE CVE-2010-1128
CVE CVE-2010-1129
CVE CVE-2010-1130
CVE CVE-2010-1866
CVE CVE-2010-1868
CVE CVE-2010-1917
CVE CVE-2010-2094

192.168.1.38 151
CVE CVE-2010-2225
CVE CVE-2010-2531
CVE CVE-2010-2950
CVE CVE-2010-3065
XREF USN:989-1

Plugin Information

Published: 2010/09/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.12

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.12

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.12

- Installed package : php5-gd_5.2.4-2ubuntu5.10


- Fixed package : php5-gd_5.2.4-2ubuntu5.12

- Installed package : php5-mysql_5.2.4-2ubuntu5.10


- Fixed package : php5-mysql_5.2.4-2ubuntu5.12

192.168.1.38 152
46700 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : postgresql-8.1, postgresql-8.3,
postgresql-8.4 vulnerabilities (USN-942-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the Safe.pm module as used by PostgreSQL did not properly restrict PL/perl
procedures. If PostgreSQL was configured to use Perl stored procedures, a remote authenticated attacker
could exploit this to execute arbitrary Perl code. (CVE-2010-1169)

It was discovered that PostgreSQL did not properly check permissions to restrict PL/Tcl procedures. If
PostgreSQL was configured to use Tcl stored procedures, a remote authenticated attacker could exploit this
to execute arbitrary Tcl code. (CVE-2010-1170)

It was discovered that PostgreSQL did not properly check privileges during certain RESET ALL operations.
A remote authenticated attacker could exploit this to remove all special parameter settings for a user or
database. (CVE-2010-1975).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/942-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0194

CVSS v2.0 Base Score

8.5 (CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

192.168.1.38 153
6.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 40215
CVE CVE-2010-1168
CVE CVE-2010-1169
CVE CVE-2010-1170
CVE CVE-2010-1975
XREF USN:942-1

Plugin Information

Published: 2010/05/24, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.11-0ubuntu8.04

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.11-0ubuntu8.04

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.11-0ubuntu8.04

192.168.1.38 154
49236 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : samba vulnerability (USN-987-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Andrew Bartlett discovered that Samba did not correctly validate the length when parsing SIDs. A remote
attacker could send a specially crafted request to the server and cause a denial of service, or possibly
execute arbitrary code with the privileges of the Samba service (smbd).

The default compiler options for Ubuntu 8.04 LTS and newer should reduce the vulnerability to a denial of
service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/987-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.8727

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

References

192.168.1.38 155
BID 43212
CVE CVE-2010-3069
XREF USN:987-1

Plugin Information

Published: 2010/09/15, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.13

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.13

192.168.1.38 156
47035 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 : samba vulnerability (USN-951-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Jun Mao discovered that Samba did not correctly validate SMB1 packet contents. An unauthenticated
remote attacker could send specially crafted network traffic that could execute arbitrary code as the root
user.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/951-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.9712

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-2010-2063
XREF USN:951-1

Exploitable With

Metasploit (true)

192.168.1.38 157
Plugin Information

Published: 2010/06/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.12

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.12

192.168.1.38 158
55087 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 / 11.04 : php5 regressions (USN-1126-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN 1126-1 fixed several vulnerabilities in PHP. The fix for CVE-2010-4697 introduced an incorrect reference
counting regression in the Zend engine that caused the PHP interpreter to segfault. This regression affects
Ubuntu 6.06 LTS and Ubuntu 8.04 LTS.

The fixes for CVE-2011-1072 and CVE-2011-1144 introduced a regression in the PEAR installer that
prevented it from creating its cache directory and reporting errors correctly.

We apologize for the inconvenience.

Stephane Chazelas discovered that the /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete
arbitrary files via a symlink attack on a directory under /var/lib/php5/. (CVE-2011-0441)

Raphael Geisert and Dan Rosenberg discovered that the PEAR installer allows local users to overwrite
arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3)
tmp_dir, and (4) pear-build-download directories. (CVE-2011-1072, CVE-2011-1144)

Ben Schmidt discovered that a use-after-free vulnerability in the PHP Zend engine could allow an attacker
to cause a denial of service (heap memory corruption) or possibly execute arbitrary code. (CVE-2010-4697)

Martin Barbella discovered a buffer overflow in the PHP GD extension that allows an attacker to cause
a denial of service (application crash) via a large number of anti- aliasing steps in an argument to the
imagepstext function.
(CVE-2010-4698)

It was discovered that PHP accepts the \0 character in a pathname, which might allow an attacker to bypass
intended access restrictions by placing a safe file extension after this character. This issue is addressed in
Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04. (CVE-2006-7243)

Maksymilian Arciemowicz discovered that the grapheme_extract function in the PHP Internationalization
extension (Intl) for ICU allow an attacker to cause a denial of service (crash) via an invalid size argument,
which triggers a NULL pointer dereference. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, and
Ubuntu 11.04. (CVE-2011-0420)

Maksymilian Arciemowicz discovered that the _zip_name_locate function in the PHP Zip extension does
not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow an attacker to cause a
denial of service (NULL pointer dereference) via an empty ZIP archive. This issue affected Ubuntu 8.04 LTS,
Ubuntu 9.10, Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04. (CVE-2011-0421)

Luca Carettoni discovered that the PHP Exif extension performs an incorrect cast on 64bit platforms, which
allows a remote attacker to cause a denial of service (application crash) via an image with a crafted Image
File Directory (IFD). (CVE-2011-0708)

Jose Carlos Norte discovered that an integer overflow in the PHP shmop extension could allow an attacker
to cause a denial of service (crash) and possibly read sensitive memory function. (CVE-2011-1092)

Felipe Pena discovered that a use-after-free vulnerability in the substr_replace function allows an attacker
to cause a denial of service (memory corruption) or possibly execute arbitrary code. (CVE-2011-1148)

192.168.1.38 159
Felipe Pena discovered multiple format string vulnerabilities in the PHP phar extension. These could allow
an attacker to obtain sensitive information from process memory, cause a denial of service (memory
corruption), or possibly execute arbitrary code. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, and
Ubuntu 11.04.(CVE-2011-1153)

It was discovered that a buffer overflow occurs in the strval function when the precision configuration
option has a large value. The default compiler options for Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS,
Ubuntu 10.10, and Ubuntu 11.04 should reduce the vulnerability to a denial of service. (CVE-2011-1464)

It was discovered that an integer overflow in the SdnToJulian function in the PHP Calendar extension could
allow an attacker to cause a denial of service (application crash). (CVE-2011-1466)

Tomas Hoger discovered that an integer overflow in the NumberFormatter::setSymbol function in the PHP
Intl extension could allow an attacker to cause a denial of service (application crash). This issue affected
Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04. (CVE-2011-1467)

It was discovered that multiple memory leaks in the PHP OpenSSL extension might allow a remote attacker
to cause a denial of service (memory consumption). This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10,
and Ubuntu 11.04.
(CVE-2011-1468)

Daniel Buschke discovered that the PHP Streams component in PHP handled types improperly, possibly
allowing an attacker to cause a denial of service (application crash).
(CVE-2011-1469)

It was discovered that the PHP Zip extension could allow an attacker to cause a denial of service
(application crash) via a ziparchive stream that is not properly handled by the stream_get_contents
function. This issue affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu
11.04. (CVE-2011-1470)

It was discovered that an integer signedness error in the PHP Zip extension could allow an attacker to
cause a denial of service (CPU consumption) via a malformed archive file.
This issue affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04.
(CVE-2011-1470) (CVE-2011-1471).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1126-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

192.168.1.38 160
EPSS Score

0.1502

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 44951
BID 45338
BID 45952
BID 46354
BID 46365
BID 46429
BID 46605
BID 46786
BID 46843
BID 46854
BID 46928
BID 46967
BID 46968
BID 46970
BID 46975
BID 46977
CVE CVE-2006-7243
CVE CVE-2010-4697
CVE CVE-2010-4698
CVE CVE-2011-0420
CVE CVE-2011-0421
CVE CVE-2011-0441
CVE CVE-2011-0708
CVE CVE-2011-1072
CVE CVE-2011-1092
CVE CVE-2011-1144
CVE CVE-2011-1148
CVE CVE-2011-1153
CVE CVE-2011-1464
CVE CVE-2011-1466
CVE CVE-2011-1467

192.168.1.38 161
CVE CVE-2011-1468
CVE CVE-2011-1469
CVE CVE-2011-1470
CVE CVE-2011-1471
XREF USN:1126-2

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.17

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.17

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.17

192.168.1.38 162
55086 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 / 11.04 : php5 vulnerabilities
(USN-1126-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Stephane Chazelas discovered that the /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete
arbitrary files via a symlink attack on a directory under /var/lib/php5/. (CVE-2011-0441)

Raphael Geisert and Dan Rosenberg discovered that the PEAR installer allows local users to overwrite
arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3)
tmp_dir, and (4) pear-build-download directories.
(CVE-2011-1072, CVE-2011-1144)

Ben Schmidt discovered that a use-after-free vulnerability in the PHP Zend engine could allow an attacker
to cause a denial of service (heap memory corruption) or possibly execute arbitrary code. (CVE-2010-4697)

Martin Barbella discovered a buffer overflow in the PHP GD extension that allows an attacker to cause
a denial of service (application crash) via a large number of anti- aliasing steps in an argument to the
imagepstext function. (CVE-2010-4698)

It was discovered that PHP accepts the \0 character in a pathname, which might allow an attacker to bypass
intended access restrictions by placing a safe file extension after this character. This issue is addressed in
Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04.
(CVE-2006-7243)

Maksymilian Arciemowicz discovered that the grapheme_extract function in the PHP Internationalization
extension (Intl) for ICU allow an attacker to cause a denial of service (crash) via an invalid size argument,
which triggers a NULL pointer dereference. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, and
Ubuntu 11.04.
(CVE-2011-0420)

Maksymilian Arciemowicz discovered that the _zip_name_locate function in the PHP Zip extension does
not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow an attacker to cause a
denial of service (NULL pointer dereference) via an empty ZIP archive. This issue affected Ubuntu 8.04 LTS,
Ubuntu 9.10, Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04. (CVE-2011-0421)

Luca Carettoni discovered that the PHP Exif extension performs an incorrect cast on 64bit platforms, which
allows a remote attacker to cause a denial of service (application crash) via an image with a crafted Image
File Directory (IFD). (CVE-2011-0708)

Jose Carlos Norte discovered that an integer overflow in the PHP shmop extension could allow an attacker
to cause a denial of service (crash) and possibly read sensitive memory function. (CVE-2011-1092)

Felipe Pena discovered that a use-after-free vulnerability in the substr_replace function allows an attacker
to cause a denial of service (memory corruption) or possibly execute arbitrary code.
(CVE-2011-1148)

Felipe Pena discovered multiple format string vulnerabilities in the PHP phar extension. These could allow
an attacker to obtain sensitive information from process memory, cause a denial of service (memory

192.168.1.38 163
corruption), or possibly execute arbitrary code. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, and
Ubuntu 11.04.(CVE-2011-1153)

It was discovered that a buffer overflow occurs in the strval function when the precision configuration
option has a large value. The default compiler options for Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS,
Ubuntu 10.10, and Ubuntu 11.04 should reduce the vulnerability to a denial of service. (CVE-2011-1464)

It was discovered that an integer overflow in the SdnToJulian function in the PHP Calendar extension could
allow an attacker to cause a denial of service (application crash). (CVE-2011-1466)

Tomas Hoger discovered that an integer overflow in the NumberFormatter::setSymbol function in the PHP
Intl extension could allow an attacker to cause a denial of service (application crash).
This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04.
(CVE-2011-1467)

It was discovered that multiple memory leaks in the PHP OpenSSL extension might allow a remote attacker
to cause a denial of service (memory consumption). This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10,
and Ubuntu 11.04. (CVE-2011-1468)

Daniel Buschke discovered that the PHP Streams component in PHP handled types improperly, possibly
allowing an attacker to cause a denial of service (application crash). (CVE-2011-1469)

It was discovered that the PHP Zip extension could allow an attacker to cause a denial of service
(application crash) via a ziparchive stream that is not properly handled by the stream_get_contents
function. This issue affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu
11.04. (CVE-2011-1470)

It was discovered that an integer signedness error in the PHP Zip extension could allow an attacker to
cause a denial of service (CPU consumption) via a malformed archive file. This issue affected Ubuntu 8.04
LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, Ubuntu 10.10, and Ubuntu 11.04. (CVE-2011-1470) (CVE-2011-1471).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1126-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

192.168.1.38 164
0.1502

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 44951
BID 45338
BID 45952
BID 46354
BID 46365
BID 46429
BID 46605
BID 46786
BID 46843
BID 46854
BID 46928
BID 46967
BID 46968
BID 46969
BID 46970
BID 46975
BID 46977
CVE CVE-2006-7243
CVE CVE-2010-4697
CVE CVE-2010-4698
CVE CVE-2011-0420
CVE CVE-2011-0421
CVE CVE-2011-0441
CVE CVE-2011-0708
CVE CVE-2011-1072
CVE CVE-2011-1092
CVE CVE-2011-1144
CVE CVE-2011-1148
CVE CVE-2011-1153
CVE CVE-2011-1464
CVE CVE-2011-1466
CVE CVE-2011-1467
CVE CVE-2011-1468

192.168.1.38 165
CVE CVE-2011-1469
CVE CVE-2011-1470
CVE CVE-2011-1471
XREF USN:1126-1

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.15

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.15

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.15

- Installed package : php5-gd_5.2.4-2ubuntu5.10


- Fixed package : php5-gd_5.2.4-2ubuntu5.15

192.168.1.38 166
50490 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : cups, cupsys vulnerability
(USN-1012-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Emmanuel Bouillon discovered that CUPS did not properly handle certain Internet Printing Protocol (IPP)
packets. A remote attacker could use this flaw to cause a denial of service or possibly execute arbitrary
code. In the default installation in Ubuntu 8.04 LTS and later, attackers would be isolated by the CUPS
AppArmor profile.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1012-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.6907

CVSS v2.0 Base Score

7.9 (CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.8 (CVSS2#E:U/RL:OF/RC:C)

References

BID 44530

192.168.1.38 167
CVE CVE-2010-2941
XREF USN:1012-1

Plugin Information

Published: 2010/11/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libcupsys2_1.3.7-1ubuntu3.9


- Fixed package : libcupsys2_1.3.7-1ubuntu3.12

192.168.1.38 168
53372 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : dhcp3 vulnerability (USN-1108-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Sebastian Krahmer discovered that the dhclient utility incorrectly filtered crafted responses. An attacker
could use this flaw with a malicious DHCP server to execute arbitrary code, resulting in root privilege
escalation.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1108-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.1

EPSS Score

0.9679

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

References

BID 47176
CVE CVE-2011-0997
XREF USN:1108-1

192.168.1.38 169
Exploitable With

CANVAS (true)

Plugin Information

Published: 2011/04/12, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : dhcp3-client_3.0.6.dfsg-1ubuntu9


- Fixed package : dhcp3-client_3.0.6.dfsg-1ubuntu9.2

- Installed package : dhcp3-common_3.0.6.dfsg-1ubuntu9


- Fixed package : dhcp3-common_3.0.6.dfsg-1ubuntu9.2

192.168.1.38 170
50491 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : freetype vulnerabilities (USN-1013-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Marc Schoenefeld discovered that FreeType did not correctly handle certain malformed font files. If a user
were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10
and 10.04 LTS.
(CVE-2010-3311)

Chris Evans discovered that FreeType did not correctly handle certain malformed TrueType font files. If a
user were tricked into using a specially crafted TrueType file, a remote attacker could cause FreeType to
crash or possibly execute arbitrary code with user privileges. This issue only affected Ubuntu 8.04 LTS, 9.10,
10.04 LTS and 10.10. (CVE-2010-3814)

It was discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user
were tricked into using a specially crafted TrueType file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges. (CVE-2010-3855).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1013-1/

Solution

Update the affected freetype2-demos, libfreetype6 and / or libfreetype6-dev packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.1743

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

192.168.1.38 171
CVSS v2.0 Temporal Score

7.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 43700
BID 44214
CVE CVE-2010-3311
CVE CVE-2010-3814
CVE CVE-2010-3855
XREF USN:1013-1

Plugin Information

Published: 2010/11/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libfreetype6_2.3.5-1ubuntu4.8.04.2


- Fixed package : libfreetype6_2.3.5-1ubuntu4.8.04.6

192.168.1.38 172
52667 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : tiff regression (USN-1085-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-1085-1 fixed vulnerabilities in the system TIFF library. The upstream fixes were incomplete and created
problems for certain CCITTFAX4 files. This update fixes the problem.

We apologize for the inconvenience.

Sauli Pahlman discovered that the TIFF library incorrectly handled invalid td_stripbytecount fields. If a user
or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could
crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10.
(CVE-2010-2482)

Sauli Pahlman discovered that the TIFF library incorrectly handled TIFF files with an invalid combination
of SamplesPerPixel and Photometric values. If a user or automated system were tricked into opening a
specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service.
This issue only affected Ubuntu 10.10. (CVE-2010-2482)

Nicolae Ghimbovschi discovered that the TIFF library incorrectly handled invalid ReferenceBlackWhite
values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote
attacker could crash the application, leading to a denial of service.
(CVE-2010-2595)

Sauli Pahlman discovered that the TIFF library incorrectly handled certain default fields. If a user or
automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash
the application, leading to a denial of service. (CVE-2010-2597, CVE-2010-2598)

It was discovered that the TIFF library incorrectly validated certain data types. If a user or automated
system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the
application, leading to a denial of service. (CVE-2010-2630)

It was discovered that the TIFF library incorrectly handled downsampled JPEG data. If a user or automated
system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary
code with user privileges, or crash the application, leading to a denial of service. This issue only affected
Ubuntu 10.04 LTS and 10.10. (CVE-2010-3087)

It was discovered that the TIFF library incorrectly handled certain JPEG data. If a user or automated system
were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code
with user privileges, or crash the application, leading to a denial of service. This issue only affected Ubuntu
6.06 LTS, 8.04 LTS and 9.10. (CVE-2011-0191)

It was discovered that the TIFF library incorrectly handled certain TIFF FAX images. If a user or automated
system were tricked into opening a specially crafted TIFF FAX image, a remote attacker could execute
arbitrary code with user privileges, or crash the application, leading to a denial of service. (CVE-2011-0191).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

192.168.1.38 173
See Also

https://usn.ubuntu.com/1085-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0964

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 41088
BID 41295
BID 41475
BID 41480
BID 43366
BID 46657
CVE CVE-2010-2482
CVE CVE-2010-2595
CVE CVE-2010-2597
CVE CVE-2010-2598
CVE CVE-2010-2630
CVE CVE-2010-3087
CVE CVE-2011-0191
XREF USN:1085-2

Plugin Information

192.168.1.38 174
Published: 2011/03/15, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.8

192.168.1.38 175
52581 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : tiff vulnerabilities (USN-1085-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Sauli Pahlman discovered that the TIFF library incorrectly handled invalid td_stripbytecount fields. If a user
or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could
crash the application, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS and 10.10.
(CVE-2010-2482)

Sauli Pahlman discovered that the TIFF library incorrectly handled TIFF files with an invalid combination
of SamplesPerPixel and Photometric values. If a user or automated system were tricked into opening a
specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service.
This issue only affected Ubuntu 10.10. (CVE-2010-2482)

Nicolae Ghimbovschi discovered that the TIFF library incorrectly handled invalid ReferenceBlackWhite
values. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote
attacker could crash the application, leading to a denial of service. (CVE-2010-2595)

Sauli Pahlman discovered that the TIFF library incorrectly handled certain default fields. If a user or
automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash
the application, leading to a denial of service. (CVE-2010-2597, CVE-2010-2598)

It was discovered that the TIFF library incorrectly validated certain data types. If a user or automated
system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the
application, leading to a denial of service. (CVE-2010-2630)

It was discovered that the TIFF library incorrectly handled downsampled JPEG data. If a user or automated
system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary
code with user privileges, or crash the application, leading to a denial of service. This issue only affected
Ubuntu 10.04 LTS and 10.10. (CVE-2010-3087)

It was discovered that the TIFF library incorrectly handled certain JPEG data. If a user or automated system
were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code
with user privileges, or crash the application, leading to a denial of service. This issue only affected Ubuntu
6.06 LTS, 8.04 LTS and 9.10. (CVE-2011-0191)

It was discovered that the TIFF library incorrectly handled certain TIFF FAX images. If a user or automated
system were tricked into opening a specially crafted TIFF FAX image, a remote attacker could execute
arbitrary code with user privileges, or crash the application, leading to a denial of service. (CVE-2011-0191).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1085-1/

Solution

192.168.1.38 176
Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0964

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 41088
BID 41295
BID 41475
BID 41480
BID 43366
BID 46657
BID 46658
CVE CVE-2010-2482
CVE CVE-2010-2483
CVE CVE-2010-2595
CVE CVE-2010-2597
CVE CVE-2010-2598
CVE CVE-2010-2630
CVE CVE-2010-3087
CVE CVE-2011-0191
CVE CVE-2011-0192
XREF USN:1085-1

Plugin Information

Published: 2011/03/08, Modified: 2019/09/19

192.168.1.38 177
Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.7

192.168.1.38 178
32359 - Ubuntu 7.04 / 7.10 / 8.04 LTS : openssh update (USN-612-5)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Matt Zimmerman discovered that entries in ~/.ssh/authorized_keys with options (such as 'no-port-
forwarding' or forced commands) were ignored by the new ssh-vulnkey tool introduced in OpenSSH (see
USN-612-2).
This could cause some compromised keys not to be listed in ssh-vulnkey's output.

This update also adds more information to ssh-vulnkey's manual page.

A weakness has been discovered in the random number generator used by OpenSSL on Debian and
Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than
they should be, such that an attacker could guess the key through a brute-force attack given minimal
knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and
SSL certificates.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/612-5/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)

192.168.1.38 179
CVSS v2.0 Temporal Score

6.4 (CVSS2#E:F/RL:OF/RC:C)

References

BID 29179
CVE CVE-2008-0166
CVE CVE-2008-2285
XREF USN:612-5
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/16, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : openssh-client_1:4.7p1-8ubuntu1


- Fixed package : openssh-client_1:4.7p1-8ubuntu1.2

192.168.1.38 180
65109 - Ubuntu 7.04 / 7.10 / 8.04 LTS : openssh vulnerability (USN-612-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

A weakness has been discovered in the random number generator used by OpenSSL on Debian and
Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they
should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge
of the system. This particularly affects the use of encryption keys in OpenSSH.

This vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other
systems can be indirectly affected if weak keys are imported into them.

We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their
systems.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/612-2/

Solution

Update the affected openssh-client and / or openssh-server packages.

Risk Factor

High

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS v2.0 Temporal Score

6.4 (CVSS2#E:F/RL:OF/RC:C)

192.168.1.38 181
References

BID 29179
CVE CVE-2008-0166
XREF USN:612-2
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2013/03/09, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : openssh-client_1:4.7p1-8ubuntu1


- Fixed package : openssh-client_1:4.7p1-8ubuntu1.1

- Installed package : openssh-server_1:4.7p1-8ubuntu1


- Fixed package : openssh-server_1:4.7p1-8ubuntu1.1

192.168.1.38 182
32358 - Ubuntu 7.04 / 7.10 / 8.04 LTS : ssl-cert vulnerability (USN-612-4)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

USN-612-1 fixed vulnerabilities in openssl. This update provides the corresponding updates for ssl-cert --
potentially compromised snake-oil SSL certificates will be regenerated.

A weakness has been discovered in the random number generator used by OpenSSL on Debian and
Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than
they should be, such that an attacker could guess the key through a brute-force attack given minimal
knowledge of the system. This particularly affects the use of encryption keys in OpenSSH, OpenVPN and
SSL certificates.

This vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other
systems can be indirectly affected if weak keys are imported into them.

We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their
systems.
(CVE-2008-0166)

== Who is affected ==

Systems which are running any of the following releases :

* Ubuntu 7.04 (Feisty) * Ubuntu 7.10 (Gutsy) * Ubuntu 8.04 LTS (Hardy) * Ubuntu 'Intrepid
Ibex' (development): libssl <= 0.9.8g-8 * Debian 4.0 (etch) (see corresponding Debian security advisory)

and have openssh-server installed or have been used to create an OpenSSH key or X.509 (SSL) certificate.

All OpenSSH and X.509 keys generated on such systems must be considered untrustworthy, regardless of
the system on which they are used, even after the update has been applied.

This includes the automatically generated host keys used by OpenSSH, which are the basis for its server
spoofing and man-in-the-middle protection.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/612-4/

Solution

Update the affected ssl-cert package.

Risk Factor

192.168.1.38 183
High

VPR Score

5.1

EPSS Score

0.1175

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS v2.0 Temporal Score

6.4 (CVSS2#E:F/RL:OF/RC:C)

References

BID 29179
CVE CVE-2008-0166
XREF USN:612-4
XREF CWE:310

Exploitable With

Core Impact (true)

Plugin Information

Published: 2008/05/16, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : ssl-cert_1.0.14-0ubuntu2


- Fixed package : ssl-cert_1.0.14-0ubuntu2.1

192.168.1.38 184
37161 - Ubuntu 7.10 / 8.04 LTS : linux-ubuntu-modules-2.6.22/24 vulnerability (USN-662-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-662-1 fixed vulnerabilities in ndiswrapper in Ubuntu 8.10. This update provides the corresponding
updates for Ubuntu 8.04 and 7.10.

Anders Kaseorg discovered that ndiswrapper did not correctly handle long ESSIDs. For a system using
ndiswrapper, a physically near-by attacker could generate specially crafted wireless network traffic and
execute arbitrary code with root privileges. (CVE-2008-4395).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/662-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.055

CVSS v2.0 Base Score

8.3 (CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2008-4395
XREF USN:662-2
XREF CWE:119

192.168.1.38 185
Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-ubuntu-modules-2.6.24-16-server_2.6.24-16.23


- Fixed package : linux-ubuntu-modules-2.6.24-<ANY>-server_2.6.24-21.33

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 186
58318 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : eglibc, glibc vulnerabilities
(USN-1396-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the GNU C Library did not properly handle integer overflows in the timezone
handling code. An attacker could use this to possibly execute arbitrary code by convincing an application to
load a maliciously constructed tzfile. (CVE-2009-5029)

It was discovered that the GNU C Library did not properly handle passwd.adjunct.byname map entries in
the Network Information Service (NIS) code in the name service caching daemon (nscd). An attacker could
use this to obtain the encrypted passwords of NIS accounts. This issue only affected Ubuntu 8.04 LTS.
(CVE-2010-0015)

Chris Evans reported that the GNU C Library did not properly calculate the amount of memory to allocate
in the fnmatch() code. An attacker could use this to cause a denial of service or possibly execute arbitrary
code via a maliciously crafted UTF-8 string. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and
Ubuntu 10.10.
(CVE-2011-1071)

Tomas Hoger reported that an additional integer overflow was possible in the GNU C Library fnmatch()
code. An attacker could use this to cause a denial of service via a maliciously crafted UTF-8 string. This issue
only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1659)

Dan Rosenberg discovered that the addmntent() function in the GNU C Library did not report an error
status for failed attempts to write to the /etc/mtab file. This could allow an attacker to corrupt /etc/mtab,
possibly causing a denial of service or otherwise manipulate mount options. This issue only affected
Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1089)

Harald van Dijk discovered that the locale program included with the GNU C library did not properly quote
its output. This could allow a local attacker to possibly execute arbitrary code using a crafted localization
string that was evaluated in a shell script. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and
Ubuntu 10.10.
(CVE-2011-1095)

It was discovered that the GNU C library loader expanded the $ORIGIN dynamic string token when RPATH is
composed entirely of this token.
This could allow an attacker to gain privilege via a setuid program that had this RPATH value.
(CVE-2011-1658)

It was discovered that the GNU C library implementation of memcpy optimized for Supplemental
Streaming SIMD Extensions 3 (SSSE3) contained a possible integer overflow. An attacker could use this to
cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 10.04 LTS.
(CVE-2011-2702)

John Zimmerman discovered that the Remote Procedure Call (RPC) implementation in the GNU C Library
did not properly handle large numbers of connections. This could allow a remote attacker to cause a denial
of service. (CVE-2011-4609)

192.168.1.38 187
It was discovered that the GNU C Library vfprintf() implementation contained a possible integer overflow
in the format string protection code offered by FORTIFY_SOURCE. An attacker could use this flaw in
conjunction with a format string vulnerability to bypass the format string protection and possibly execute
arbitrary code. (CVE-2012-0864).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1396-1/

Solution

Update the affected libc-bin and / or libc6 packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0236

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 37885
BID 46563
BID 46740
BID 47370
BID 50898
BID 51439
BID 52201
CVE CVE-2009-5029
CVE CVE-2010-0015
CVE CVE-2011-1071

192.168.1.38 188
CVE CVE-2011-1089
CVE CVE-2011-1095
CVE CVE-2011-1658
CVE CVE-2011-1659
CVE CVE-2011-2702
CVE CVE-2011-4609
CVE CVE-2012-0864
XREF USN:1396-1
XREF CWE:255

Plugin Information

Published: 2012/03/12, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libc6_2.7-10ubuntu5


- Fixed package : libc6_2.7-10ubuntu8.1

192.168.1.38 189
56870 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : freetype vulnerabilities (USN-1267-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that FreeType did not correctly handle certain malformed Type 1 font files. If a user were
tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly
execute arbitrary code with user privileges.
(CVE-2011-3256)

It was discovered that FreeType did not correctly handle certain malformed CID-keyed PostScript font files.
If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to
crash or possibly execute arbitrary code with user privileges. (CVE-2011-3439).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1267-1/

Solution

Update the affected libfreetype6 package.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0277

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.9 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 190
References

BID 50155
BID 50643
CVE CVE-2011-3256
CVE CVE-2011-3439
XREF USN:1267-1

Plugin Information

Published: 2011/11/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libfreetype6_2.3.5-1ubuntu4.8.04.2


- Fixed package : libfreetype6_2.3.5-1ubuntu4.8.04.7

192.168.1.38 191
57998 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libpng vulnerabilities (USN-1367-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libpng did not properly verify the embedded profile length of iCCP chunks. An
attacker could exploit this to cause a denial of service via application crash. This issue only affected Ubuntu
8.04 LTS. (CVE-2009-5063)

Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during
chunk decompression. If a user or automated system using libpng were tricked into opening a specially
crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges
of the user invoking the program. (CVE-2011-3026).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1367-1/

Solution

Update the affected libpng12-0 package.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.8319

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 192
References

BID 52049
CVE CVE-2009-5063
CVE CVE-2011-3026
XREF USN:1367-1

Plugin Information

Published: 2012/02/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpng12-0_1.2.15~beta5-3ubuntu0.2


- Fixed package : libpng12-0_1.2.15~beta5-3ubuntu0.5

192.168.1.38 193
57615 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libxml2 vulnerabilities (USN-1334-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libxml2 contained an off by one error. If a user or application linked against libxml2
were tricked into opening a specially crafted XML file, an attacker could cause the application to crash or
possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-0216)

It was discovered that libxml2 is vulnerable to double-free conditions when parsing certain XML
documents. This could allow a remote attacker to cause a denial of service. (CVE-2011-2821,
CVE-2011-2834)

It was discovered that libxml2 did not properly detect end of file when parsing certain XML documents. An
attacker could exploit this to crash applications linked against libxml2. (CVE-2011-3905)

It was discovered that libxml2 did not properly decode entity references with long names. If a user or
application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could
cause the application to crash or possibly execute arbitrary code with the privileges of the user invoking the
program.
(CVE-2011-3919).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1334-1/

Solution

Update the affected libxml2 package.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0402

CVSS v2.0 Base Score

192.168.1.38 194
9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.9 (CVSS2#E:U/RL:OF/RC:C)

References

BID 48832
BID 49279
BID 49658
BID 51084
BID 51300
CVE CVE-2011-0216
CVE CVE-2011-2821
CVE CVE-2011-2834
CVE CVE-2011-3905
CVE CVE-2011-3919
XREF USN:1334-1

Plugin Information

Published: 2012/01/20, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.7

192.168.1.38 195
58325 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-
dfsg-5.1 vulnerabilities (USN-1397-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions
to fix these issues.

MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10.
Ubuntu 8.04 LTS has been updated to MySQL 5.0.95.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly
incompatible changes.

Please see the following for more information :

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html http://dev.mysql.com/doc/refman/5.0/en/
news-5-0-x.html http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.ht ml.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1397-1/

Solution

Update the affected mysql-server-5.0 and / or mysql-server-5.1 packages.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.9716

CVSS v2.0 Base Score

8.5 (CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)

192.168.1.38 196
CVSS v2.0 Temporal Score

7.0 (CVSS2#E:F/RL:OF/RC:C)

References

BID 26353
BID 29106
BID 31081
BID 31486
BID 35609
BID 37075
BID 37297
BID 37640
BID 37943
BID 38043
BID 39543
BID 40100
BID 40106
BID 40109
BID 40257
BID 41198
BID 42596
BID 42598
BID 42599
BID 42625
BID 42633
BID 42638
BID 42646
BID 43676
BID 51488
BID 51493
BID 51502
BID 51504
BID 51505
BID 51508
BID 51509
BID 51519
BID 51520
BID 51526
CVE CVE-2007-5925
CVE CVE-2008-3963
CVE CVE-2008-4098
CVE CVE-2008-4456

192.168.1.38 197
CVE CVE-2008-7247
CVE CVE-2009-2446
CVE CVE-2009-4019
CVE CVE-2009-4030
CVE CVE-2009-4484
CVE CVE-2010-1621
CVE CVE-2010-1626
CVE CVE-2010-1848
CVE CVE-2010-1849
CVE CVE-2010-1850
CVE CVE-2010-2008
CVE CVE-2010-3677
CVE CVE-2010-3678
CVE CVE-2010-3679
CVE CVE-2010-3680
CVE CVE-2010-3681
CVE CVE-2010-3682
CVE CVE-2010-3683
CVE CVE-2010-3833
CVE CVE-2010-3834
CVE CVE-2010-3835
CVE CVE-2010-3836
CVE CVE-2010-3837
CVE CVE-2010-3838
CVE CVE-2010-3839
CVE CVE-2010-3840
CVE CVE-2011-2262
CVE CVE-2012-0075
CVE CVE-2012-0087
CVE CVE-2012-0101
CVE CVE-2012-0102
CVE CVE-2012-0112
CVE CVE-2012-0113
CVE CVE-2012-0114
CVE CVE-2012-0115
CVE CVE-2012-0116
CVE CVE-2012-0117
CVE CVE-2012-0118
CVE CVE-2012-0119
CVE CVE-2012-0120
CVE CVE-2012-0484
CVE CVE-2012-0485
CVE CVE-2012-0486

192.168.1.38 198
CVE CVE-2012-0487
CVE CVE-2012-0488
CVE CVE-2012-0489
CVE CVE-2012-0490
CVE CVE-2012-0491
CVE CVE-2012-0492
CVE CVE-2012-0493
CVE CVE-2012-0494
CVE CVE-2012-0495
CVE CVE-2012-0496
XREF USN:1397-1
XREF CWE:20
XREF CWE:59
XREF CWE:79
XREF CWE:119
XREF CWE:134

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2012/03/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.95-0ubuntu1

192.168.1.38 199
57887 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : openssl vulnerabilities (USN-1357-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the elliptic curve cryptography (ECC) subsystem in OpenSSL, when using the Elliptic
Curve Digital Signature Algorithm (ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement
curves over binary fields. This could allow an attacker to determine private keys via a timing attack. This
issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945)

Adam Langley discovered that the ephemeral Elliptic Curve Diffie-Hellman (ECDH) functionality in OpenSSL
did not ensure thread safety while processing handshake messages from clients. This could allow a remote
attacker to cause a denial of service via out-of-order messages that violate the TLS protocol. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04.
(CVE-2011-3210)

Nadhem Alfardan and Kenny Paterson discovered that the Datagram Transport Layer Security (DTLS)
implementation in OpenSSL performed a MAC check only if certain padding is valid. This could allow a
remote attacker to recover plaintext. (CVE-2011-4108)

Antonio Martin discovered that a flaw existed in the fix to address CVE-2011-4108, the DTLS MAC check
failure. This could allow a remote attacker to cause a denial of service. (CVE-2012-0050)

Ben Laurie discovered a double free vulnerability in OpenSSL that could be triggered when the
X509_V_FLAG_POLICY_CHECK flag is enabled.
This could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS,
Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-4109)

It was discovered that OpenSSL, in certain circumstances involving ECDH or ECDHE cipher suites, used
an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic
curves. This could allow a remote attacker to obtain the private key of a TLS server via multiple handshake
attempts. This issue only affected Ubuntu 8.04 LTS. (CVE-2011-4354)

Adam Langley discovered that the SSL 3.0 implementation in OpenSSL did not properly initialize data
structures for block cipher padding. This could allow a remote attacker to obtain sensitive information.
(CVE-2011-4576)

Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled, could trigger an assert when
handling an X.509 certificate containing certificate-extension data associated with IP address blocks or
Autonomous System (AS) identifiers. This could allow a remote attacker to cause a denial of service.
(CVE-2011-4577)

Adam Langley discovered that the Server Gated Cryptography (SGC) implementation in OpenSSL did not
properly handle handshake restarts.
This could allow a remote attacker to cause a denial of service.
(CVE-2011-4619)

Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL did not properly handle invalid
parameters. This could allow a remote attacker to cause a denial of service via crafted data from a TLS
client. This issue only affected Ubuntu 11.10. (CVE-2012-0027).

192.168.1.38 200
Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1357-1/

Solution

Update the affected libssl0.9.8, libssl1.0.0 and / or openssl packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.3047

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.9 (CVSS2#E:U/RL:OF/RC:C)

References

BID 47888
BID 49471
BID 50882
BID 51281
BID 51563
CVE CVE-2011-1945
CVE CVE-2011-3210
CVE CVE-2011-4108
CVE CVE-2011-4109
CVE CVE-2011-4354
CVE CVE-2011-4576
CVE CVE-2011-4577
CVE CVE-2011-4619

192.168.1.38 201
CVE CVE-2012-0027
CVE CVE-2012-0050
XREF USN:1357-1

Plugin Information

Published: 2012/02/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.15

192.168.1.38 202
57932 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : php5 regression (USN-1358-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN 1358-1 fixed multiple vulnerabilities in PHP. The fix for CVE-2012-0831 introduced a regression where
the state of the magic_quotes_gpc setting was not correctly reflected when calling the ini_get() function.

We apologize for the inconvenience.

It was discovered that PHP computed hash values for form parameters without restricting the ability
to trigger hash collisions predictably. This could allow a remote attacker to cause a denial of service by
sending many crafted parameters. (CVE-2011-4885)

ATTENTION: this update changes previous PHP behavior by limiting the number of external input variables
to 1000.
This may be increased by adding a 'max_input_vars' directive to the php.ini configuration file. See http://
www.php.net/manual/en/info.configuration.php#ini.max- input-vars for more information.

Stefan Esser discovered that the fix to address the predictable hash collision issue, CVE-2011-4885, did not
properly handle the situation where the limit was reached.
This could allow a remote attacker to cause a denial of service or execute arbitrary code via a request
containing a large number of variables. (CVE-2012-0830)

It was discovered that PHP did not always check the return value of the zend_strndup function. This could
allow a remote attacker to cause a denial of service.
(CVE-2011-4153)

It was discovered that PHP did not properly enforce libxslt security settings. This could allow a remote
attacker to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension.
(CVE-2012-0057)

It was discovered that PHP did not properly enforce that PDORow objects could not be serialized and not
be saved in a session. A remote attacker could use this to cause a denial of service via an application crash.
(CVE-2012-0788)

It was discovered that PHP allowed the magic_quotes_gpc setting to be disabled remotely. This could allow
a remote attacker to bypass restrictions that could prevent a SQL injection. (CVE-2012-0831)

USN 1126-1 addressed an issue where the /etc/cron.d/php5 cron job for PHP allowed local users to delete
arbitrary files via a symlink attack on a directory under /var/lib/php5/. Emese Revfy discovered that the fix
had not been applied to PHP for Ubuntu 10.04 LTS. This update corrects the issue. We apologize for the
error.
(CVE-2011-0441).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

192.168.1.38 203
https://usn.ubuntu.com/1358-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.8875

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-2011-0441
CVE CVE-2011-4153
CVE CVE-2011-4885
CVE CVE-2012-0057
CVE CVE-2012-0788
CVE CVE-2012-0830
CVE CVE-2012-0831
XREF USN:1358-2

Exploitable With

Core Impact (true)

Plugin Information

Published: 2012/02/14, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.23

192.168.1.38 204
- Installed package : php5-cli_5.2.4-2ubuntu5.10
- Fixed package : php5-cli_5.2.4-2ubuntu5.23

192.168.1.38 205
56554 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : php5 vulnerabilities (USN-1231-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Mateusz Kocielski, Marek Kroemeke and Filip Palian discovered that a stack-based buffer overflow existed
in the socket_connect function's handling of long pathnames for AF_UNIX sockets. A remote attacker might
be able to exploit this to execute arbitrary code; however, the default compiler options for affected releases
should reduce the vulnerability to a denial of service. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10
and Ubuntu 11.04. (CVE-2011-1938)

Krzysztof Kotowicz discovered that the PHP post handler function does not properly restrict filenames in
multipart/form-data POST requests.
This may allow remote attackers to conduct absolute path traversal attacks and possibly create or
overwrite arbitrary files. This issue affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. (CVE-2011-2202)

It was discovered that the crypt function for blowfish does not properly handle 8-bit characters. This could
make it easier for an attacker to discover a cleartext password containing an 8-bit character that has a
matching blowfish crypt value. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04.
(CVE-2011-2483)

It was discovered that PHP did not properly check the return values of the malloc(3), calloc(3) and realloc(3)
library functions in multiple locations. This could allow an attacker to cause a denial of service via a NULL
pointer dereference or possibly execute arbitrary code.
This issue affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-3182)

Maksymilian Arciemowicz discovered that PHP did not properly implement the error_log function. This
could allow an attacker to cause a denial of service via an application crash. This issue affected Ubuntu
10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. (CVE-2011-3267)

Maksymilian Arciemowicz discovered that the ZipArchive functions addGlob() and addPattern() did not
properly check their flag arguments. This could allow a malicious script author to cause a denial of service
via application crash. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10.
(CVE-2011-1657)

It was discovered that the Xend opcode parser in PHP could be interrupted while handling the shift-left,
shift-right, and bitwise-xor opcodes. This could allow a malicious script author to expose memory contents.
This issue affected Ubuntu 10.04 LTS.
(CVE-2010-1914)

It was discovered that the strrchr function in PHP could be interrupted by a malicious script, allowing the
exposure of memory contents. This issue affected Ubuntu 8.04 LTS. (CVE-2010-2484).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

192.168.1.38 206
https://usn.ubuntu.com/1231-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

7.3

EPSS Score

0.0548

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 41991
BID 47950
BID 48259
BID 49241
BID 49249
BID 49252
CVE CVE-2010-1914
CVE CVE-2010-2484
CVE CVE-2011-1657
CVE CVE-2011-1938
CVE CVE-2011-2202
CVE CVE-2011-2483
CVE CVE-2011-3182
CVE CVE-2011-3267
XREF USN:1231-1

Plugin Information

Published: 2011/10/19, Modified: 2019/09/19

192.168.1.38 207
Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.18

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.18

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.18

192.168.1.38 208
57888 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : php5 vulnerabilities (USN-1358-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PHP computed hash values for form parameters without restricting the ability
to trigger hash collisions predictably. This could allow a remote attacker to cause a denial of service by
sending many crafted parameters. (CVE-2011-4885)

ATTENTION: this update changes previous PHP behavior by limiting the number of external input variables
to 1000. This may be increased by adding a 'max_input_vars' directive to the php.ini configuration file.
See http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars for more information.

Stefan Esser discovered that the fix to address the predictable hash collision issue, CVE-2011-4885, did
not properly handle the situation where the limit was reached. This could allow a remote attacker to
cause a denial of service or execute arbitrary code via a request containing a large number of variables.
(CVE-2012-0830)

It was discovered that PHP did not always check the return value of the zend_strndup function. This could
allow a remote attacker to cause a denial of service. (CVE-2011-4153)

It was discovered that PHP did not properly enforce libxslt security settings. This could allow a remote
attacker to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension.
(CVE-2012-0057)

It was discovered that PHP did not properly enforce that PDORow objects could not be serialized and not
be saved in a session. A remote attacker could use this to cause a denial of service via an application crash.
(CVE-2012-0788)

It was discovered that PHP allowed the magic_quotes_gpc setting to be disabled remotely. This could allow
a remote attacker to bypass restrictions that could prevent a SQL injection. (CVE-2012-0831)

USN 1126-1 addressed an issue where the /etc/cron.d/php5 cron job for PHP allowed local users to delete
arbitrary files via a symlink attack on a directory under /var/lib/php5/. Emese Revfy discovered that the fix
had not been applied to PHP for Ubuntu 10.04 LTS. This update corrects the issue. We apologize for the
error. (CVE-2011-0441).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1358-1/

Solution

Update the affected packages.

192.168.1.38 209
Risk Factor

High

VPR Score

6.7

EPSS Score

0.8875

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

6.5 (CVSS2#E:H/RL:OF/RC:C)

References

BID 46928
BID 51417
BID 51806
BID 51830
CVE CVE-2011-0441
CVE CVE-2011-4153
CVE CVE-2011-4885
CVE CVE-2012-0057
CVE CVE-2012-0788
CVE CVE-2012-0830
CVE CVE-2012-0831
XREF USN:1358-1

Exploitable With

Core Impact (true)

Plugin Information

Published: 2012/02/10, Modified: 2019/09/19

Plugin Output

tcp/0

192.168.1.38 210
- Installed package : php5-cgi_5.2.4-2ubuntu5.10
- Fixed package : php5-cgi_5.2.4-2ubuntu5.22

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.22

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.22

192.168.1.38 211
56048 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : apache2 vulnerability (USN-1199-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

A flaw was discovered in the byterange filter in Apache. A remote attacker could exploit this to cause a
denial of service via resource exhaustion.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1199-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.9631

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.8 (CVSS2#E:H/RL:OF/RC:C)

References

BID 49303
CVE CVE-2011-3192
XREF USN:1199-1

192.168.1.38 212
Exploitable With

Core Impact (true)

Plugin Information

Published: 2011/09/02, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2-mpm-prefork_2.2.8-1ubuntu0.15


- Fixed package : apache2-mpm-prefork_2.2.8-1ubuntu0.21

192.168.1.38 213
56281 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : apt vulnerabilities (USN-1215-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that the apt-key utility incorrectly verified GPG keys when downloaded via the net-update
option. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially
be used to install altered packages. This update corrects the issue by disabling the net-update option
completely. A future update will re-enable the option with corrected verification.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1215-1/

Solution

Update the affected apt package.

Risk Factor

High

References

XREF USN:1215-1

Plugin Information

Published: 2011/09/23, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apt_0.7.9ubuntu17


- Fixed package : apt_0.7.9ubuntu17.3

192.168.1.38 214
55414 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : curl vulnerabilities (USN-1158-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Richard Silverman discovered that when doing GSSAPI authentication, libcurl unconditionally performs
credential delegation, handing the server a copy of the client's security credential. (CVE-2011-2192)

Wesley Miaw discovered that when zlib is enabled, libcurl does not properly restrict the amount of callback
data sent to an application that requests automatic decompression. This might allow an attacker to cause
a denial of service via an application crash or possibly execute arbitrary code with the privilege of the
application. This issue only affected Ubuntu 8.04 LTS and Ubuntu 10.04 LTS. (CVE-2010-0734)

USN 818-1 fixed an issue with curl's handling of SSL certificates with zero bytes in the Common Name. Due
to a packaging error, the fix for this issue was not being applied during the build. This issue only affected
Ubuntu 8.04 LTS. We apologize for the error. (CVE-2009-2417)

Scott Cantor discovered that curl did not correctly handle SSL certificates with zero bytes in the Common
Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive
information or alter encrypted communications.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1158-1/

Solution

Update the affected libcurl3, libcurl3-gnutls and / or libcurl3-nss packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0443

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

192.168.1.38 215
References

CVE CVE-2009-2417
CVE CVE-2010-0734
CVE CVE-2011-2192
XREF USN:1158-1
XREF CWE:310

Plugin Information

Published: 2011/06/24, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libcurl3-gnutls_7.18.0-1ubuntu2


- Fixed package : libcurl3-gnutls_7.18.0-1ubuntu2.3

192.168.1.38 216
55168 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : libxml2 vulnerability (USN-1153-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Chris Evans discovered that libxml2 incorrectly handled memory allocation. If an application using libxml2
opened a specially crafted XML file, an attacker could cause a denial of service or possibly execute code as
the user invoking the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1153-1/

Solution

Update the affected libxml2 package.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.007

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

7.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 48056
CVE CVE-2011-1944
XREF USN:1153-1

192.168.1.38 217
Plugin Information

Published: 2011/06/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.6

192.168.1.38 218
59526 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : apt update (USN-1475-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Georgi Guninski discovered that APT relied on GnuPG argument order and did not check GPG subkeys
when validating imported keyrings via apt-key net-update. While it appears that a man-in-the-middle
attacker cannot exploit this, as a hardening measure this update adjusts apt-key to validate all subkeys
when checking for key collisions.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1475-1/

Solution

Update the affected apt package.

Risk Factor

High

References

XREF USN:1475-1

Plugin Information

Published: 2012/06/15, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apt_0.7.9ubuntu17


- Fixed package : apt_0.7.9ubuntu17.5

192.168.1.38 219
62495 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : bind9 vulnerability (USN-1601-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Jake Montgomery discovered that Bind incorrectly handled certain specific combinations of RDATA. A
remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1601-1/

Solution

Update the affected bind9 package.

Risk Factor

High

VPR Score

3.6

EPSS Score

0.0854

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.8 (CVSS2#E:U/RL:OF/RC:C)

References

CVE CVE-2012-5166
XREF USN:1601-1

192.168.1.38 220
Plugin Information

Published: 2012/10/11, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : bind9_1:9.4.2-10


- Fixed package : bind9_1:9.4.2.dfsg.P2-2ubuntu0.12

192.168.1.38 221
62179 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : gnupg, gnupg2 vulnerability
(USN-1570-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that GnuPG used a short ID when downloading keys from a keyserver, even if a long ID
was requested. An attacker could possibly use this to return a different key with a duplicate short key id.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1570-1/

Solution

Update the affected gnupg and / or gnupg2 packages.

Risk Factor

High

References

XREF USN:1570-1

Plugin Information

Published: 2012/09/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : gnupg_1.4.6-2ubuntu5


- Fixed package : gnupg_1.4.6-2ubuntu5.1

192.168.1.38 222
59016 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : php5 vulnerability (USN-1437-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that PHP, when used as a stand alone CGI processor for the Apache Web Server, did not
properly parse and filter query strings. This could allow a remote attacker to execute arbitrary code running
with the privilege of the web server. Configurations using mod_php5 and FastCGI were not vulnerable.

This update addresses the issue when the PHP CGI interpreter is configured using mod_cgi and
mod_actions as described in /usr/share/doc/php5-cgi/README.Debian.gz; however, if an alternate
configuration is used to enable PHP CGI processing, it should be reviewed to ensure that command line
arguments cannot be passed to the PHP interpreter. Please see CVE-2012-2311 for more details and
potential mitigation approaches.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1437-1/

Solution

Update the affected php5-cgi package.

Risk Factor

High

VPR Score

9.0

EPSS Score

0.9514

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

6.5 (CVSS2#E:H/RL:OF/RC:C)

192.168.1.38 223
References

CVE CVE-2012-1823
CVE CVE-2012-2311
XREF USN:1437-1
XREF CISA-KNOWN-EXPLOITED:2022/04/15

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2012/05/07, Modified: 2022/03/28

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.24

192.168.1.38 224
59170 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : sudo vulnerability (USN-1442-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that sudo incorrectly handled network masks when using Host and Host_List. A local user
who is listed in sudoers may be allowed to run commands on unintended hosts when IPv4 network masks
are used to grant access. A local attacker could exploit this to bypass intended access restrictions. Host and
Host_List are not used in the default installation of Ubuntu.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1442-1/

Solution

Update the affected sudo and / or sudo-ldap packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0004

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2012-2337
XREF USN:1442-1

Plugin Information

Published: 2012/05/17, Modified: 2019/09/19

192.168.1.38 225
Plugin Output

tcp/0

- Installed package : sudo_1.6.9p10-1ubuntu3


- Fixed package : sudo_1.6.9p10-1ubuntu3.9

192.168.1.38 226
59856 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : tiff vulnerabilities (USN-1498-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the TIFF library incorrectly handled certain malformed TIFF images. If a user or
automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash
the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
(CVE-2012-2088)

It was discovered that the tiff2pdf utility incorrectly handled certain malformed TIFF images. If a user
or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could
crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.
(CVE-2012-2113).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1498-1/

Solution

Update the affected libtiff-tools and / or libtiff4 packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0723

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 227
References

BID 54076
BID 54270
CVE CVE-2012-2088
CVE CVE-2012-2113
XREF USN:1498-1

Plugin Information

Published: 2012/07/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.12

192.168.1.38 228
63109 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : perl vulnerabilities (USN-1643-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that the decode_xs function in the Encode module is vulnerable to a heap-based buffer
overflow via a crafted Unicode string. An attacker could use this overflow to cause a denial of service.
(CVE-2011-2939)

It was discovered that the 'new' constructor in the Digest module is vulnerable to an eval injection. An
attacker could use this to execute arbitrary code. (CVE-2011-3597)

It was discovered that Perl's 'x' string repeat operator is vulnerable to a heap-based buffer overflow. An
attacker could use this to execute arbitrary code. (CVE-2012-5195)

Ryo Anazawa discovered that the CGI.pm module does not properly escape newlines in Set-Cookie or P3P
(Platform for Privacy Preferences Project) headers. An attacker could use this to inject arbitrary headers
into responses from applications that use CGI.pm.
(CVE-2012-5526).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1643-1/

Solution

Update the affected perl package.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0357

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

192.168.1.38 229
CVSS v2.0 Temporal Score

5.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 49858
BID 49911
BID 56287
BID 56562
CVE CVE-2011-2939
CVE CVE-2011-3597
CVE CVE-2012-5195
CVE CVE-2012-5526
XREF USN:1643-1

Plugin Information

Published: 2012/11/30, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : perl_5.8.8-12ubuntu0.5


- Fixed package : perl_5.8.8-12ubuntu0.7

192.168.1.38 230
65629 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : perl vulnerability (USN-1770-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Yves Orton discovered that Perl incorrectly handled hashing when using user-provided hash keys. An
attacker could use this flaw to perform a denial of service attack against software written in Perl.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1770-1/

Solution

Update the affected perl package.

Risk Factor

High

VPR Score

5.8

EPSS Score

0.0184

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.5 (CVSS2#E:U/RL:OF/RC:C)

References

BID 58311
CVE CVE-2013-1667
XREF USN:1770-1

192.168.1.38 231
Plugin Information

Published: 2013/03/20, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : perl_5.8.8-12ubuntu0.5


- Fixed package : perl_5.8.8-12ubuntu0.8

192.168.1.38 232
65818 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : postgresql-8.3, postgresql-8.4,
postgresql-9.1 vulnerabilities (USN-1789-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Mitsumasa Kondo and Kyotaro Horiguchi discovered that PostgreSQL incorrectly handled certain
connection requests containing database names starting with a dash. A remote attacker could use this flaw
to damage or destroy files within a server's data directory. This issue only applied to Ubuntu 11.10, Ubuntu
12.04 LTS, and Ubuntu 12.10.
(CVE-2013-1899)

Marko Kreen discovered that PostgreSQL incorrectly generated random numbers. An authenticated
attacker could use this flaw to possibly guess another database user's random numbers. (CVE-2013-1900)

Noah Misch discovered that PostgreSQL incorrectly handled certain privilege checks. An unprivileged
attacker could use this flaw to possibly interfere with in-progress backups. This issue only applied to
Ubuntu 11.10, Ubuntu 12.04 LTS, and Ubuntu 12.10. (CVE-2013-1901).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1789-1/

Solution

Update the affected postgresql-8.3, postgresql-8.4 and / or postgresql-9.1 packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.9707

CVSS v2.0 Base Score

8.5 (CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C)

192.168.1.38 233
CVSS v2.0 Temporal Score

6.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 58876
BID 58878
BID 58879
CVE CVE-2013-1899
CVE CVE-2013-1900
CVE CVE-2013-1901
XREF USN:1789-1

Plugin Information

Published: 2013/04/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.23-0ubuntu8.04.1

192.168.1.38 234
39363 - Ubuntu 8.04 LTS / 8.10 / 9.04 : apr-util vulnerabilities (USN-786-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Matthew Palmer discovered an underflow flaw in apr-util. An attacker could cause a denial of service
via application crash in Apache using a crafted SVNMasterURI directive, .htaccess file, or when using
mod_apreq2. Applications using libapreq2 are also affected.
(CVE-2009-0023)

It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could
cause a denial of service via memory resource consumption by sending a crafted request to an Apache
server configured to use mod_dav or mod_dav_svn. (CVE-2009-1955)

C. Michael Pilato discovered an off-by-one buffer overflow in apr-util when formatting certain strings. For
big-endian machines (powerpc, hppa and sparc in Ubuntu), a remote attacker could cause a denial of
service or information disclosure leak. All other architectures for Ubuntu are not considered to be at risk.
(CVE-2009-1956).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/786-1/

Solution

Update the affected libaprutil1, libaprutil1-dbg and / or libaprutil1-dev packages.

Risk Factor

High

VPR Score

6.0

EPSS Score

0.389

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

192.168.1.38 235
CVSS v2.0 Temporal Score

6.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 35221
BID 35251
BID 35253
CVE CVE-2009-0023
CVE CVE-2009-1955
CVE CVE-2009-1956
XREF USN:786-1
XREF CWE:119
XREF CWE:189
XREF CWE:399

Plugin Information

Published: 2009/06/11, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libaprutil1_1.2.12+dfsg-3


- Fixed package : libaprutil1_1.2.12+dfsg-3ubuntu0.1

192.168.1.38 236
50318 - Ubuntu 8.04 LTS / 9.04 / 9.10 / 10.04 LTS / 10.10 : glibc, eglibc vulnerabilities (USN-1009-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Tavis Ormandy discovered multiple flaws in the GNU C Library's handling of the LD_AUDIT environment
variable when running a privileged binary. A local attacker could exploit this to gain root privileges.
(CVE-2010-3847, CVE-2010-3856).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1009-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

8.9

EPSS Score

0.0009

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.0 (CVSS2#E:F/RL:OF/RC:C)

References

BID 44154
BID 44347
CVE CVE-2010-3847

192.168.1.38 237
CVE CVE-2010-3856
CVE CVE-2011-0536
XREF USN:1009-1

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2010/10/24, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libc6_2.7-10ubuntu5


- Fixed package : libc6_2.7-10ubuntu7

- Installed package : libc6-dev_2.7-10ubuntu5


- Fixed package : libc6-dev_2.7-10ubuntu7

- Installed package : libc6-i686_2.7-10ubuntu5


- Fixed package : libc6-i686_2.7-10ubuntu7

192.168.1.38 238
51501 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : eglibc, glibc vulnerability (USN-1009-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-1009-1 fixed vulnerabilities in the GNU C library. Colin Watson discovered that the fixes were
incomplete and introduced flaws with setuid programs loading libraries that used dynamic string tokens
in their RPATH. If the 'man' program was installed setuid, a local attacker could exploit this to gain 'man'
user privileges, potentially leading to further privilege escalations. Default Ubuntu installations were not
affected.

Tavis Ormandy discovered multiple flaws in the GNU C Library's handling of the LD_AUDIT environment
variable when running a privileged binary. A local attacker could exploit this to gain root privileges.
(CVE-2010-3847, CVE-2010-3856).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1009-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

8.9

EPSS Score

0.0009

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.0 (CVSS2#E:F/RL:OF/RC:C)

192.168.1.38 239
References

BID 44154
BID 44347
CVE CVE-2010-3847
CVE CVE-2010-3856
CVE CVE-2011-0536
XREF USN:1009-2

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2011/01/12, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libc6_2.7-10ubuntu5


- Fixed package : libc6_2.7-10ubuntu8

- Installed package : libc6-dev_2.7-10ubuntu5


- Fixed package : libc6-dev_2.7-10ubuntu8

- Installed package : libc6-i686_2.7-10ubuntu5


- Fixed package : libc6-i686_2.7-10ubuntu8

192.168.1.38 240
50649 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : openssl vulnerability (USN-1018-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Rob Hulswit discovered a race condition in the OpenSSL TLS server extension parsing code when used
within a threaded server. A remote attacker could trigger this flaw to cause a denial of service or possibly
execute arbitrary code with application privileges.
(CVE-2010-3864).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1018-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.3347

CVSS v2.0 Base Score

7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.6 (CVSS2#E:U/RL:OF/RC:C)

References

BID 44884
CVE CVE-2010-3864

192.168.1.38 241
XREF USN:1018-1

Plugin Information

Published: 2010/11/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.12

192.168.1.38 242
52529 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : pango1.0 vulnerabilities (USN-1082-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Marc Schoenefeld discovered that Pango incorrectly handled certain Glyph Definition (GDEF) tables. If a
user were tricked into displaying text with a specially crafted font, an attacker could cause Pango to crash,
resulting in a denial of service. This issue only affected Ubuntu 8.04 LTS and 9.10. (CVE-2010-0421)

Dan Rosenberg discovered that Pango incorrectly handled certain FT_Bitmap objects. If a user were tricked
into displaying text with a specially- crafted font, an attacker could cause a denial of service or execute
arbitrary code with privileges of the user invoking the program. The default compiler options for affected
releases should reduce the vulnerability to a denial of service. (CVE-2011-0020)

It was discovered that Pango incorrectly handled certain memory reallocation failures. If a user were tricked
into displaying text in a way that would cause a reallocation failure, an attacker could cause a denial of
service or execute arbitrary code with privileges of the user invoking the program. This issue only affected
Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2011-0064).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1082-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.1754

CVSS v2.0 Base Score

7.6 (CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)

192.168.1.38 243
CVSS v2.0 Temporal Score

6.0 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 38760
BID 45842
BID 46632
CVE CVE-2010-0421
CVE CVE-2011-0020
CVE CVE-2011-0064
XREF USN:1082-1

Plugin Information

Published: 2011/03/03, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpango1.0-0_1.20.5-0ubuntu1.1


- Fixed package : libpango1.0-0_1.20.5-0ubuntu1.2

- Installed package : libpango1.0-common_1.20.5-0ubuntu1.1


- Fixed package : libpango1.0-common_1.20.5-0ubuntu1.2

192.168.1.38 244
48904 - Ubuntu 8.04 LTS : linux regression (USN-974-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-974-1 fixed vulnerabilities in the Linux kernel. The fixes for CVE-2010-2240 caused failures for Xen
hosts. This update fixes the problem.

We apologize for the inconvenience.

Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory manager did not properly
handle when applications grow stacks into adjacent memory regions. A local attacker could exploit this to
gain control of certain applications, potentially leading to privilege escalation, as demonstrated in attacks
against the X server.
(CVE-2010-2240)

Kees Cook discovered that under certain situations the ioctl subsystem for DRM did not properly sanitize its
arguments. A local attacker could exploit this to read previously freed kernel memory, leading to a loss of
privacy. (CVE-2010-2803)

Ben Hawkes discovered an integer overflow in the Controller Area Network (CAN) subsystem when setting
up frame content and filtering certain messages. An attacker could send specially crafted CAN traffic to
crash the system or gain root privileges. (CVE-2010-2959).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/974-2/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

8.9

EPSS Score

0.0022

192.168.1.38 245
CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2010-2240
CVE CVE-2010-2803
CVE CVE-2010-2959
XREF USN:974-2

Plugin Information

Published: 2010/08/27, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.77

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.77

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 246
52475 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1072-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Gleb Napatov discovered that KVM did not correctly check certain privileged operations. A local attacker
with access to a guest kernel could exploit this to crash the host system, leading to a denial of service.
(CVE-2010-0435)

Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by
NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignment or
had become unlinked, leading to a loss of privacy.
(CVE-2010-2943)

Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user
could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-3296, CVE-2010-3297)

Dan Jacobson discovered that ThinkPad video output was not correctly access controlled. A local attacker
could exploit this to hang the system, leading to a denial of service. (CVE-2010-3448)

It was discovered that KVM did not correctly initialize certain CPU registers. A local attacker could exploit
this to crash the system, leading to a denial of service. (CVE-2010-3698)

It was discovered that Xen did not correctly clean up threads. A local attacker in a guest system could
exploit this to exhaust host system resources, leading to a denial of serivce. (CVE-2010-3699)

Brad Spengler discovered that stack memory for new a process was not correctly calculated. A local
attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-3858)

Dan Rosenberg discovered that the Linux kernel TIPC implementation contained multiple integer
signedness errors. A local attacker could exploit this to gain root privileges. (CVE-2010-3859)

Dan Rosenberg discovered that the Linux kernel X.25 implementation incorrectly parsed facilities. A remote
attacker could exploit this to crash the kernel, leading to a denial of service. (CVE-2010-3873)

Vasiliy Kulikov discovered that the Linux kernel X.25 implementation did not correctly clear kernel memory.
A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3875)

Vasiliy Kulikov discovered that the Linux kernel sockets implementation did not properly initialize certain
structures. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3876)

Vasiliy Kulikov discovered that the TIPC interface did not correctly initialize certain structures. A local
attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-3877)

Nelson Elhage discovered that the Linux kernel IPv4 implementation did not properly audit certain
bytecodes in netlink messages. A local attacker could exploit this to cause the kernel to hang, leading to a
denial of service. (CVE-2010-3880)

192.168.1.38 247
Kees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A
local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-4072)

Dan Rosenberg discovered that the USB subsystem did not correctly initialize certian structures. A local
attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-4074)

Dan Rosenberg discovered that the SiS video driver did not correctly clear kernel memory. A local attacker
could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4078)

Dan Rosenberg discovered that the ivtv V4L driver did not correctly initialize certian structures. A local
attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-4079)

Dan Rosenberg discovered that the RME Hammerfall DSP audio interface driver did not correctly clear
kernel memory. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-4080, CVE-2010-4081)

Dan Rosenberg discovered that the semctl syscall did not correctly clear kernel memory. A local attacker
could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4083)

James Bottomley discovered that the ICP vortex storage array controller driver did not validate certain
sizes. A local attacker on a 64bit system could exploit this to crash the kernel, leading to a denial of service.
(CVE-2010-4157)

Dan Rosenberg discovered that the Linux kernel L2TP implementation contained multiple integer
signedness errors. A local attacker could exploit this to to crash the kernel, or possibly gain root privileges.
(CVE-2010-4160)

It was discovered that multithreaded exec did not handle CPU timers correctly. A local attacker could
exploit this to crash the system, leading to a denial of service. (CVE-2010-4248).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1072-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

192.168.1.38 248
EPSS Score

0.0631

CVSS v2.0 Base Score

7.9 (CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:N)

CVSS v2.0 Temporal Score

6.2 (CVSS2#E:POC/RL:OF/RC:ND)

References

BID 38607
BID 42527
BID 42582
BID 43221
BID 43229
BID 43809
BID 43810
BID 44301
BID 44354
BID 44500
BID 44630
BID 44642
BID 44648
BID 44665
BID 44762
BID 45028
BID 45039
BID 45054
BID 45058
BID 45062
BID 45063
BID 45074
CVE CVE-2010-0435
CVE CVE-2010-2943
CVE CVE-2010-3296
CVE CVE-2010-3297
CVE CVE-2010-3448
CVE CVE-2010-3698
CVE CVE-2010-3699
CVE CVE-2010-3858
CVE CVE-2010-3859

192.168.1.38 249
CVE CVE-2010-3873
CVE CVE-2010-3875
CVE CVE-2010-3876
CVE CVE-2010-3877
CVE CVE-2010-3880
CVE CVE-2010-4072
CVE CVE-2010-4074
CVE CVE-2010-4078
CVE CVE-2010-4079
CVE CVE-2010-4080
CVE CVE-2010-4081
CVE CVE-2010-4083
CVE CVE-2010-4157
CVE CVE-2010-4160
CVE CVE-2010-4248
XREF USN:1072-1

Plugin Information

Published: 2011/03/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.86

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.86

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 250
53303 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1105-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory.
A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4075)

Dan Rosenberg discovered that the socket filters did not correctly initialize structure memory. A local
attacker could create malicious filters to read portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4158)

Dan Rosenberg discovered that certain iovec operations did not calculate page counts correctly. A local
attacker could exploit this to crash the system, leading to a denial of service. (CVE-2010-4162)

Dan Rosenberg discovered that the SCSI subsystem did not correctly validate iov segments. A local attacker
with access to a SCSI device could send specially crafted requests to crash the system, leading to a denial of
service. (CVE-2010-4163, CVE-2010-4668)

Dan Rosenberg discovered multiple flaws in the X.25 facilities parsing. If a system was using X.25, a remote
attacker could exploit this to crash the system, leading to a denial of service.
(CVE-2010-4164)

Alan Cox discovered that the HCI UART driver did not correctly check if a write operation was available.
If the mmap_min-addr sysctl was changed from the Ubuntu default to a value of 0, a local attacker could
exploit this flaw to gain root privileges. (CVE-2010-4242)

Nelson Elhage discovered that the kernel did not correctly handle process cleanup after triggering a
recoverable kernel bug. If a local attacker were able to trigger certain kinds of kernel bugs, they could
create a specially crafted process to gain root privileges.
(CVE-2010-4258)

Tavis Ormandy discovered that the install_special_mapping function could bypass the mmap_min_addr
restriction. A local attacker could exploit this to mmap 4096 bytes below the mmap_min_addr area,
possibly improving the chances of performing NULL pointer dereference attacks.
(CVE-2010-4346).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1105-1/

Solution

Update the affected packages.

192.168.1.38 251
Risk Factor

High

VPR Score

8.9

EPSS Score

0.032

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 43806
BID 44758
BID 44793
BID 45014
BID 45055
BID 45059
BID 45159
BID 45323
CVE CVE-2010-4075
CVE CVE-2010-4076
CVE CVE-2010-4077
CVE CVE-2010-4158
CVE CVE-2010-4162
CVE CVE-2010-4163
CVE CVE-2010-4164
CVE CVE-2010-4242
CVE CVE-2010-4258
CVE CVE-2010-4346
CVE CVE-2010-4668
XREF USN:1105-1

Exploitable With

Core Impact (true)

192.168.1.38 252
Plugin Information

Published: 2011/04/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.88

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-29.88

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 253
55094 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1133-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Nelson Elhage discovered that Econet did not correctly handle AUN packets over UDP. A local attacker could
send specially crafted traffic to crash the system, leading to a denial of service.
(CVE-2010-4342)

Dan Rosenberg discovered that the OSS subsystem did not handle name termination correctly. A local
attacker could exploit this crash the system or gain root privileges. (CVE-2010-4527)

Dan Rosenberg discovered that IRDA did not correctly check the size of buffers. On non-x86 systems, a
local attacker could exploit this to read kernel heap memory, leading to a loss of privacy. (CVE-2010-4529)

Dan Carpenter discovered that the TTPCI DVB driver did not check certain values during an ioctl. If the
dvb-ttpci module was loaded, a local attacker could exploit this to crash the system, leading to a denial of
service, or possibly gain root privileges. (CVE-2011-0521).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1133-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0032

CVSS v2.0 Base Score

7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)

192.168.1.38 254
CVSS v2.0 Temporal Score

6.2 (CVSS2#E:ND/RL:OF/RC:ND)

References

BID 45321
BID 45556
BID 45629
BID 45986
BID 46417
CVE CVE-2010-4342
CVE CVE-2010-4527
CVE CVE-2010-4529
CVE CVE-2011-0521
CVE CVE-2011-0711
XREF USN:1133-1

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.89

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 255
55109 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1146-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Kees Cook discovered that some ethtool functions did not correctly clear heap memory. A local attacker
with CAP_NET_ADMIN privileges could exploit this to read portions of kernel heap memory, leading to a
loss of privacy. (CVE-2010-4655)

Kees Cook discovered that the IOWarrior USB device driver did not correctly check certain size fields. A local
attacker with physical access could plug in a specially crafted USB device to crash the system or potentially
gain root privileges. (CVE-2010-4656)

Goldwyn Rodrigues discovered that the OCFS2 filesystem did not correctly clear memory when writing
certain file holes. A local attacker could exploit this to read uninitialized data from the disk, leading to a loss
of privacy. (CVE-2011-0463)

Jens Kuehnel discovered that the InfiniBand driver contained a race condition. On systems using InfiniBand,
a local attacker could send specially crafted requests to crash the system, leading to a denial of service.
(CVE-2011-0695)

Rafael Dominguez Vega discovered that the caiaq Native Instruments USB driver did not correctly validate
string lengths. A local attacker with physical access could plug in a specially crafted USB device to crash the
system or potentially gain root privileges. (CVE-2011-0712)

Timo Warns discovered that LDM partition parsing routines did not correctly calculate block counts. A local
attacker with physical access could plug in a specially crafted block device to crash the system, leading to a
denial of service. (CVE-2011-1012)

Timo Warns discovered that the LDM disk partition handling code did not correctly handle certain values.
By inserting a specially crafted disk device, a local attacker could exploit this to gain root privileges.
(CVE-2011-1017)

Tavis Ormandy discovered that the pidmap function did not correctly handle large requests. A local attacker
could exploit this to crash the system, leading to a denial of service. (CVE-2011-1593).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1146-1/

Solution

Update the affected packages.

Risk Factor

192.168.1.38 256
High

VPR Score

6.7

EPSS Score

0.0038

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 45972
BID 46069
BID 46419
BID 46512
BID 46839
BID 47116
BID 47497
CVE CVE-2010-4655
CVE CVE-2010-4656
CVE CVE-2011-0463
CVE CVE-2011-0695
CVE CVE-2011-0712
CVE CVE-2011-1012
CVE CVE-2011-1017
CVE CVE-2011-1593
XREF USN:1146-1

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.90

192.168.1.38 257
Because Debian/Ubuntu linux packages increment their package name numbers as
well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 258
55607 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1170-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Rosenberg discovered that multiple terminal ioctls did not correctly initialize structure memory.
A local attacker could exploit this to read portions of kernel stack memory, leading to a loss of privacy.
(CVE-2010-4076, CVE-2010-4077)

It was discovered that Xen did not correctly handle certain block requests. A local attacker in a Xen guest
could cause the Xen host to use all available CPU resources, leading to a denial of service.
(CVE-2010-4247)

It was discovered that the ICMP stack did not correctly handle certain unreachable messages. If a remote
attacker were able to acquire a socket lock, they could send specially crafted traffic that would crash the
system, leading to a denial of service. (CVE-2010-4526)

Kees Cook reported that /proc/pid/stat did not correctly filter certain memory locations. A local attacker
could determine the memory layout of processes in an attempt to increase the chances of a successful
memory corruption exploit. (CVE-2011-0726)

Timo Warns discovered that OSF partition parsing routines did not correctly clear memory. A local attacker
with physical access could plug in a specially crafted block device to read kernel memory, leading to a loss
of privacy. (CVE-2011-1163)

Timo Warns discovered that the GUID partition parsing routines did not correctly validate certain
structures. A local attacker with physical access could plug in a specially crafted block device to crash the
system, leading to a denial of service. (CVE-2011-1577)

Vasiliy Kulikov discovered that the AGP driver did not check certain ioctl values. A local attacker with access
to the video subsystem could exploit this to crash the system, leading to a denial of service, or possibly gain
root privileges. (CVE-2011-1745, CVE-2011-2022)

Vasiliy Kulikov discovered that the AGP driver did not check the size of certain memory allocations. A local
attacker with access to the video subsystem could exploit this to run the system out of memory, leading to
a denial of service. (CVE-2011-1746).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1170-1/

Solution

Update the affected packages.

192.168.1.38 259
Risk Factor

High

VPR Score

6.4

EPSS Score

0.0624

CVSS v2.0 Base Score

7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.6 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 45029
BID 45059
BID 45661
BID 46878
BID 47343
BID 47534
BID 47535
BID 47791
BID 47832
BID 47843
CVE CVE-2010-4076
CVE CVE-2010-4077
CVE CVE-2010-4247
CVE CVE-2010-4526
CVE CVE-2011-0726
CVE CVE-2011-1163
CVE CVE-2011-1577
CVE CVE-2011-1745
CVE CVE-2011-1746
CVE CVE-2011-1747
CVE CVE-2011-2022
XREF USN:1170-1

Plugin Information

192.168.1.38 260
Published: 2011/07/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.91

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 261
55922 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1189-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the /proc filesystem did not correctly handle permission changes when programs
executed. A local attacker could hold open files to examine details about programs running with higher
privileges, potentially increasing the chances of exploiting additional vulnerabilities. (CVE-2011-1020)

Vasiliy Kulikov discovered that the Bluetooth stack did not correctly clear memory. A local attacker could
exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2011-1078)

Vasiliy Kulikov discovered that the Bluetooth stack did not correctly check that device name strings were
NULL terminated. A local attacker could exploit this to crash the system, leading to a denial of service, or
leak contents of kernel stack memory, leading to a loss of privacy. (CVE-2011-1079)

Vasiliy Kulikov discovered that bridge network filtering did not check that name fields were NULL
terminated. A local attacker could exploit this to leak contents of kernel stack memory, leading to a loss of
privacy. (CVE-2011-1080)

Johan Hovold discovered that the DCCP network stack did not correctly handle certain packet
combinations. A remote attacker could send specially crafted network traffic that would crash the system,
leading to a denial of service. (CVE-2011-1093)

Peter Huewe discovered that the TPM device did not correctly initialize memory. A local attacker could
exploit this to read kernel heap memory contents, leading to a loss of privacy. (CVE-2011-1160)

Dan Rosenberg discovered that the IRDA subsystem did not correctly check certain field sizes. If a system
was using IRDA, a remote attacker could send specially crafted traffic to crash the system or gain root
privileges. (CVE-2011-1180)

Dan Rosenberg discovered that the X.25 Rose network stack did not correctly handle certain fields. If a
system was running with Rose enabled, a remote attacker could send specially crafted traffic to gain root
privileges. (CVE-2011-1493)

It was discovered that Bluetooth l2cap and rfcomm did not correctly initialize structures. A local attacker
could exploit this to read portions of the kernel stack, leading to a loss of privacy.
(CVE-2011-2492)

Dan Rosenberg discovered flaws in the linux Rose (X.25 PLP) layer used by amateur radio. A local user or a
remote user on an X.25 network could exploit these flaws to execute arbitrary code as root.
(CVE-2011-4913)

Ben Hutchings discovered several flaws in the Linux Rose (X.25 PLP) layer. A local user or a remote user on
an X.25 network could exploit these flaws to execute arbitrary code as root. (CVE-2011-4914).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

192.168.1.38 262
https://usn.ubuntu.com/1189-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.6

EPSS Score

0.0271

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

6.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 46567
BID 46616
BID 46793
BID 46866
BID 46935
BID 46980
BID 48441
CVE CVE-2011-1020
CVE CVE-2011-1078
CVE CVE-2011-1079
CVE CVE-2011-1080
CVE CVE-2011-1093
CVE CVE-2011-1160
CVE CVE-2011-1180
CVE CVE-2011-1493
CVE CVE-2011-2492
CVE CVE-2011-4913
CVE CVE-2011-4914

192.168.1.38 263
XREF USN:1189-1

Plugin Information

Published: 2011/08/20, Modified: 2019/10/16

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.93

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 264
56911 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1268-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that CIFS incorrectly handled authentication. When a user had a CIFS share mounted that
required authentication, a local user could mount the same share without knowing the correct password.
(CVE-2011-1585)

It was discovered that the GRE protocol incorrectly handled netns initialization. A remote attacker could
send a packet while the ip_gre module was loading, and crash the system, leading to a denial of service.
(CVE-2011-1767)

It was discovered that the IP/IP protocol incorrectly handled netns initialization. A remote attacker could
send a packet while the ipip module was loading, and crash the system, leading to a denial of service.
(CVE-2011-1768)

Vasily Averin discovered that the NFS Lock Manager (NLM) incorrectly handled unlock requests. A local
attacker could exploit this to cause a denial of service. (CVE-2011-2491)

Robert Swiecki discovered that mapping extensions were incorrectly handled. A local attacker could exploit
this to crash the system, leading to a denial of service. (CVE-2011-2496)

Ben Pfaff discovered that Classless Queuing Disciplines (qdiscs) were being incorrectly handled. A local
attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2525)

Yasuaki Ishimatsu discovered a flaw in the kernel's clock implementation. A local unprivileged attacker
could exploit this causing a denial of service. (CVE-2011-3209).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1268-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

192.168.1.38 265
EPSS Score

0.0051

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 47852
BID 47853
BID 48641
BID 50311
CVE CVE-2011-1585
CVE CVE-2011-1767
CVE CVE-2011-1768
CVE CVE-2011-2491
CVE CVE-2011-2496
CVE CVE-2011-2525
CVE CVE-2011-3209
XREF USN:1268-1

Plugin Information

Published: 2011/11/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-30.96

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 266
57055 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1291-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

A bug was discovered in the XFS filesystem's handling of pathnames. A local attacker could exploit this to
crash the system, leading to a denial of service, or gain root privileges. (CVE-2011-4077)

A flaw was found in the Journaling Block Device (JBD). A local attacker able to mount ext3 or ext4 file
systems could exploit this to crash the system, leading to a denial of service. (CVE-2011-4132)

Clement Lecigne discovered a bug in the HFS file system bounds checking. When a malformed HFS file
system is mounted a local user could crash the system or gain root privileges. (CVE-2011-4330).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1291-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0004

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2011-4077
CVE CVE-2011-4132
CVE CVE-2011-4330

192.168.1.38 267
XREF USN:1291-1

Plugin Information

Published: 2011/12/09, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-30.97

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 268
58271 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1390-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Rosenberg reported errors in the OSS (Open Sound System) MIDI interface. A local attacker on non-
x86 systems might be able to cause a denial of service. (CVE-2011-1476)

Dan Rosenberg reported errors in the kernel's OSS (Open Sound System) driver for Yamaha FM synthesizer
chips. A local user can exploit this to cause memory corruption, causing a denial of service or privilege
escalation. (CVE-2011-1477)

Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM partitions. A local user could exploit
this to cause a denial of service or escalate privileges. (CVE-2011-2182)

A flaw was discovered in the Linux kernel's NFSv4 (Network File System version 4) file system. A local,
unprivileged user could use this flaw to cause a denial of service by creating a file in a NFSv4 filesystem.
(CVE-2011-4324)

A flaw was found in how the linux kernel handles user-space held futexs. An unprivileged user could exploit
this flaw to cause a denial of service or possibly elevate privileges. (CVE-2012-0028).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1390-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0004

CVSS v2.0 Base Score

192.168.1.38 269
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 47007
BID 47009
BID 50798
BID 51947
CVE CVE-2011-1476
CVE CVE-2011-1477
CVE CVE-2011-2182
CVE CVE-2011-4324
CVE CVE-2012-0028
XREF USN:1390-1

Plugin Information

Published: 2012/03/07, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-31.99

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 270
59816 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1493-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Stephan Mueller reported a flaw in the Linux kernel's dl2k network driver's handling of ioctls. An
unprivileged local user could leverage this flaw to cause a denial of service. (CVE-2012-2313)

Timo Warns reported multiple flaws in the Linux kernel's hfsplus filesystem. An unprivileged local user
could exploit these flaws to gain root system priviliges. (CVE-2012-2319).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1493-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.0005

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

References

CVE CVE-2012-2313
CVE CVE-2012-2319
XREF USN:1493-1

192.168.1.38 271
Plugin Information

Published: 2012/07/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-31.102

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 272
59985 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1507-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

A flaw was found in the Linux kernel's KVM (Kernel Virtual Machine) virtual cpu setup. An unprivileged local
user could exploit this flaw to crash the system leading to a denial of service. (CVE-2012-1601)

An error was found in the Linux kernel's IPv6 netfilter when connection tracking is enabled. A remote
attacker could exploit this flaw to crash a system if it is using IPv6 with the nf_contrack_ipv6 kernel module
loaded. (CVE-2012-2744).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1507-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

3.6

EPSS Score

0.0435

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.8 (CVSS2#E:U/RL:OF/RC:C)

References

192.168.1.38 273
BID 53488
BID 54367
CVE CVE-2012-1601
CVE CVE-2012-2744
XREF USN:1507-1

Plugin Information

Published: 2012/07/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-32.104

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 274
33093 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-614-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PowerPC kernels did not correctly handle reporting certain system details. By
requesting a specific set of information, a local attacker could cause a system crash resulting in a denial of
service. (CVE-2007-6694)

A race condition was discovered between dnotify fcntl() and close() in the kernel. If a local attacker
performed malicious dnotify requests, they could cause memory consumption leading to a denial of
service, or possibly send arbitrary signals to any process. (CVE-2008-1375)

On SMP systems, a race condition existed in fcntl(). Local attackers could perform malicious locks, causing
system crashes and leading to a denial of service. (CVE-2008-1669)

The tehuti network driver did not correctly handle certain IO functions. A local attacker could perform
malicious requests to the driver, potentially accessing kernel memory, leading to privilege escalation or
access to private system information. (CVE-2008-1675).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/614-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0011

CVSS v2.0 Base Score

7.8 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)

192.168.1.38 275
References

CVE CVE-2007-6694
CVE CVE-2008-1375
CVE CVE-2008-1669
CVE CVE-2008-1675
XREF USN:614-1
XREF CWE:94
XREF CWE:362
XREF CWE:399

Plugin Information

Published: 2008/06/04, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-18.32

- Installed package : linux-ubuntu-modules-2.6.24-16-server_2.6.24-16.23


- Fixed package : linux-ubuntu-modules-2.6.24-<ANY>-server_2.6.24-18.26

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 276
62474 - Ubuntu 8.04 LTS : linux vulnerability (USN-1598-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

An error was discovered in the Linux kernel's network TUN/TAP device implementation. A local user with
access to the TUN/TAP interface (which is not available to unprivileged users until granted by a root user)
could exploit this flaw to crash the system or potential gain administrative privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1598-1/

Solution

Update the affected packages.

Risk Factor

High

VPR Score

6.7

EPSS Score

0.0004

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 53721
CVE CVE-2012-2136
XREF USN:1598-1

192.168.1.38 277
Plugin Information

Published: 2012/10/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-32.105

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 278
58131 - Ubuntu 8.04 LTS : samba vulnerability (USN-1374-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Andy Davis discovered that Samba incorrectly handled certain AndX offsets. A remote attacker could send a
specially crafted request to the server and cause a denial of service, or possibly execute arbitrary code.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1374-1/

Solution

Update the affected samba package.

Risk Factor

High

VPR Score

5.9

EPSS Score

0.9551

CVSS v2.0 Base Score

7.9 (CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.8 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52103
CVE CVE-2012-0870
XREF USN:1374-1

192.168.1.38 279
Plugin Information

Published: 2012/02/27, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.17

192.168.1.38 280
10205 - rlogin Service Detection

Synopsis

The rlogin service is running on the remote host.

Description

The rlogin service is running on the remote host. This service is vulnerable since data is passed between
the rlogin client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local
network) then it may be possible to bypass authentication.
Finally, rlogin is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.

Solution

Comment out the 'login' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this
service and use SSH instead.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.015

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-1999-0651

Exploitable With

Metasploit (true)

Plugin Information

Published: 1999/08/30, Modified: 2022/04/11

192.168.1.38 281
Plugin Output

tcp/513/rlogin

192.168.1.38 282
10245 - rsh Service Detection

Synopsis

The rsh service is running on the remote host.

Description

The rsh service is running on the remote host. This service is vulnerable since data is passed between
the rsh client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and
passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable
to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local
network) then it may be possible to bypass authentication.
Finally, rsh is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.

Solution

Comment out the 'rsh' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this service
and use SSH instead.

Risk Factor

High

VPR Score

7.4

EPSS Score

0.015

CVSS v2.0 Base Score

7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-1999-0651

Exploitable With

Metasploit (true)

Plugin Information

Published: 1999/08/22, Modified: 2022/04/11

192.168.1.38 283
Plugin Output

tcp/514/rsh

192.168.1.38 284
12085 - Apache Tomcat Default Files

Synopsis

The remote web server contains default files.

Description

The default error page, default index page, example JSPs and/or example servlets are installed on the
remote Apache Tomcat server. These files should be removed as they may help an attacker uncover
information about the remote Tomcat install or host itself.

See Also

http://www.nessus.org/u?4cb3b4dd
https://www.owasp.org/index.php/Securing_tomcat

Solution

Delete the default index page and remove the example JSP and servlets. Follow the Tomcat or OWASP
instructions to replace or modify the default error page.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2004/03/02, Modified: 2024/09/03

Plugin Output

tcp/8180/www

The following default files were found :

http://192.168.1.38:8180/tomcat-docs/index.html

The server is not configured to return a custom page in the event of a client requesting a non-
existent resource.
This may result in a potential disclosure of sensitive information about the server to attackers.

192.168.1.38 285
192.168.1.38 286
12217 - DNS Server Cache Snooping Remote Information Disclosure

Synopsis

The remote DNS server is vulnerable to cache snooping attacks.

Description

The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.

This may allow a remote attacker to determine which domains have recently been resolved via this name
server, and therefore which hosts have been recently visited.

For instance, if an attacker was interested in whether your company utilizes the online services of a
particular financial institution, they would be able to use this attack to build a statistical model regarding
company usage of that financial institution. Of course, the attack can also be used to find B2B partners,
web-surfing patterns, external mail servers, and more.

Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the
internal network. This may include employees, consultants and potentially users on a guest network or
WiFi connection if supported.

See Also

http://cs.unc.edu/~fabian/course_papers/cache_snooping.pdf

Solution

Contact the vendor of the DNS software for a fix.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2004/04/27, Modified: 2020/04/07

Plugin Output

udp/53/dns

192.168.1.38 287
Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.215.14

192.168.1.38 288
11213 - HTTP TRACE / TRACK Methods Allowed

Synopsis

Debugging functions are enabled on the remote web server.

Description

The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods
that are used to debug web server connections.

See Also

http://www.nessus.org/u?e979b5cb
http://www.apacheweek.com/issues/03-01-24
https://download.oracle.com/sunalerts/1000718.1.html

Solution

Disable these HTTP methods. Refer to the plugin output for more information.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v3.0 Temporal Score

4.6 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

4.0

EPSS Score

0.0058

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 289
References

BID 9506
BID 9561
BID 11604
BID 33374
BID 37995
CVE CVE-2003-1567
CVE CVE-2004-2320
CVE CVE-2010-0386
XREF CERT:288308
XREF CERT:867593
XREF CWE:16
XREF CWE:200

Plugin Information

Published: 2003/01/23, Modified: 2024/04/09

Plugin Output

tcp/80/www

To disable these methods, add the following lines for each virtual
host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2


support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : \n\n------------------------------ snip


------------------------------\nTRACE /Nessus680479587.html HTTP/1.1
Connection: Close
Host: 192.168.1.38
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------\n\nand received the


following response from the remote server :\n\n------------------------------ snip
------------------------------\nHTTP/1.1 200 OK
Date: Thu, 05 Dec 2024 11:21:55 GMT
Server: Apache/2.2.8 (Ubuntu) DAV/2
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http

TRACE /Nessus680479587.html HTTP/1.1


Connection: Keep-Alive

192.168.1.38 290
Host: 192.168.1.38
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------\n

192.168.1.38 291
139915 - ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS

Synopsis

The remote name server is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the installation of ISC BIND running on the remote name
server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected
by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated
response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a
truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.

See Also

https://kb.isc.org/docs/cve-2020-8622

Solution

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)

CVSS v3.0 Temporal Score

5.7 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

4.4

EPSS Score

0.0041

CVSS v2.0 Base Score

4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)

192.168.1.38 292
CVSS v2.0 Temporal Score

3.0 (CVSS2#E:U/RL:OF/RC:C)

STIG Severity

References

CVE CVE-2020-8622
XREF IAVA:2020-A-0385-S

Plugin Information

Published: 2020/08/27, Modified: 2021/06/03

Plugin Output

udp/53/dns

Installed version : 9.4.2


Fixed version : 9.11.22, 9.16.6, 9.17.4 or later

192.168.1.38 293
136808 - ISC BIND Denial of Service

Synopsis

The remote name server is affected by an assertion failure vulnerability.

Description

A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 /
9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue,
via a specially-crafted message, to cause the service to stop responding.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported
version number.

See Also

https://kb.isc.org/docs/cve-2020-8617

Solution

Upgrade to the patched release most closely related to your current version of BIND.

Risk Factor

Medium

CVSS v3.0 Base Score

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVSS v3.0 Temporal Score

5.3 (CVSS:3.0/E:P/RL:O/RC:C)

VPR Score

4.4

EPSS Score

0.972

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 294
3.4 (CVSS2#E:POC/RL:OF/RC:C)

STIG Severity

References

CVE CVE-2020-8617
XREF IAVA:2020-A-0217-S

Plugin Information

Published: 2020/05/22, Modified: 2023/03/23

Plugin Output

udp/53/dns

Installed version : 9.4.2


Fixed version : 9.11.19

192.168.1.38 295
33447 - Multiple Vendor DNS Query ID Field Prediction Cache Poisoning

Synopsis

The remote name resolver (or the server it uses upstream) is affected by a DNS cache poisoning
vulnerability.

Description

The remote DNS resolver does not use random ports when making queries to third-party DNS servers. An
unauthenticated, remote attacker can exploit this to poison the remote DNS server, allowing the attacker to
divert legitimate traffic to arbitrary sites.

See Also

https://www.cnet.com/news/massive-coordinated-dns-patch-released/
https://www.theregister.co.uk/2008/07/21/dns_flaw_speculation/

Solution

Contact your DNS server vendor for a patch.

Risk Factor

Medium

CVSS v3.0 Base Score

6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

CVSS v3.0 Temporal Score

6.1 (CVSS:3.0/E:P/RL:O/RC:C)

VPR Score

6.0

EPSS Score

0.1395

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

192.168.1.38 296
3.9 (CVSS2#E:POC/RL:OF/RC:C)

STIG Severity

References

BID 30131
CVE CVE-2008-1447
XREF CERT:800113
XREF IAVA:2008-A-0045
XREF EDB-ID:6122
XREF EDB-ID:6123
XREF EDB-ID:6130

Plugin Information

Published: 2008/07/09, Modified: 2024/04/03

Plugin Output

udp/53/dns

The remote DNS server uses non-random ports for its


DNS requests. An attacker may spoof DNS responses.

List of used ports :

+ DNS Server: 171.76.81.91


|- Port: 8068
|- Port: 8068
|- Port: 8068
|- Port: 8068

192.168.1.38 297
57608 - SMB Signing not required

Synopsis

Signing is not required on the remote SMB server.

Description

Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to
conduct man-in-the-middle attacks against the SMB server.

See Also

http://www.nessus.org/u?df39b8b3
http://technet.microsoft.com/en-us/library/cc731957.aspx
http://www.nessus.org/u?74b80723
https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
http://www.nessus.org/u?a3cac4ea

Solution

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting
'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server
signing'. See the 'see also' links for further details.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score

4.6 (CVSS:3.0/E:U/RL:O/RC:C)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

Plugin Information

192.168.1.38 298
Published: 2012/01/19, Modified: 2022/10/05

Plugin Output

tcp/445/cifs

192.168.1.38 299
52611 - SMTP Service STARTTLS Plaintext Command Injection

Synopsis

The remote mail service allows plaintext command injection while negotiating an encrypted
communications channel.

Description

The remote SMTP service contains a software flaw in its STARTTLS implementation that could allow a
remote, unauthenticated attacker to inject commands during the plaintext protocol phase that will be
executed during the ciphertext protocol phase.

Successful exploitation could allow an attacker to steal a victim's email or associated SASL (Simple
Authentication and Security Layer) credentials.

See Also

https://tools.ietf.org/html/rfc2487
https://www.securityfocus.com/archive/1/516901/30/0/threaded

Solution

Contact the vendor to see if an update is available.

Risk Factor

Medium

VPR Score

7.3

EPSS Score

0.0114

CVSS v2.0 Base Score

4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVSS v2.0 Temporal Score

3.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 46767

192.168.1.38 300
CVE CVE-2011-0411
CVE CVE-2011-1430
CVE CVE-2011-1431
CVE CVE-2011-1432
CVE CVE-2011-1506
CVE CVE-2011-2165
XREF CERT:555316

Plugin Information

Published: 2011/03/10, Modified: 2019/03/06

Plugin Output

tcp/25/smtp

Nessus sent the following two commands in a single packet :

STARTTLS\r\nRSET\r\n

And the server sent the following two responses :

220 2.0.0 Ready to start TLS


250 2.0.0 Ok

192.168.1.38 301
90317 - SSH Weak Algorithms Supported

Synopsis

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

Description

Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no
cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys.

See Also

https://tools.ietf.org/html/rfc4253#section-6.3

Solution

Contact the vendor or consult product documentation to remove the weak ciphers.

Risk Factor

Medium

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2016/04/04, Modified: 2016/12/14

Plugin Output

tcp/22/ssh

The following weak server-to-client encryption algorithms are supported :

arcfour
arcfour128
arcfour256

The following weak client-to-server encryption algorithms are supported :

arcfour
arcfour128
arcfour256

192.168.1.38 302
31705 - SSL Anonymous Cipher Suites Supported

Synopsis

The remote service supports the use of anonymous SSL ciphers.

Description

The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up
a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to
verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.

Note: This is considerably easier to exploit if the attacker is on the same physical network.

See Also

http://www.nessus.org/u?3a040ada

Solution

Reconfigure the affected application if possible to avoid use of weak ciphers.

Risk Factor

Low

CVSS v3.0 Base Score

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v3.0 Temporal Score

5.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

4.4

EPSS Score

0.0031

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

1.9 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 303
References

BID 28482
CVE CVE-2007-1858

Plugin Information

Published: 2008/03/28, Modified: 2023/10/27

Plugin Output

tcp/25/smtp

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128)
SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256)
SHA1
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 304
51192 - SSL Certificate Cannot Be Trusted

Synopsis

The SSL certificate for this service cannot be trusted.

Description

The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which
the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public
certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are missing that would connect the top of the certificate chain
to a known public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users
to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-
middle attacks against the remote host.

See Also

https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509

Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

192.168.1.38 305
Plugin Information

Published: 2010/12/15, Modified: 2020/04/27

Plugin Output

tcp/25/smtp

The following certificate was part of the certificate chain


sent by the remote host, but it has expired :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Not After : Apr 16 14:07:45 2010 GMT

The following certificate was at the top of the certificate


chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Issuer : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for
Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

192.168.1.38 306
51192 - SSL Certificate Cannot Be Trusted

Synopsis

The SSL certificate for this service cannot be trusted.

Description

The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which
the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public
certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed
certificate, or when intermediate certificates are missing that would connect the top of the certificate chain
to a known public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can
occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the
certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information
or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be
re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a
signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users
to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-
middle attacks against the remote host.

See Also

https://www.itu.int/rec/T-REC-X.509/en
https://en.wikipedia.org/wiki/X.509

Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

192.168.1.38 307
Plugin Information

Published: 2010/12/15, Modified: 2020/04/27

Plugin Output

tcp/5432/postgresql

The following certificate was part of the certificate chain


sent by the remote host, but it has expired :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Not After : Apr 16 14:07:45 2010 GMT

The following certificate was at the top of the certificate


chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain
|-Issuer : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for
Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

192.168.1.38 308
15901 - SSL Certificate Expiry

Synopsis

The remote server's SSL certificate has already expired.

Description

This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and
reports whether any have already expired.

Solution

Purchase or generate a new SSL certificate to replace the existing one.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Plugin Information

Published: 2004/12/03, Modified: 2021/02/03

Plugin Output

tcp/25/smtp

The SSL certificate has already expired :

Subject : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,


OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
[email protected]
Issuer : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,
OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
[email protected]
Not valid before : Mar 17 14:07:45 2010 GMT
Not valid after : Apr 16 14:07:45 2010 GMT

192.168.1.38 309
15901 - SSL Certificate Expiry

Synopsis

The remote server's SSL certificate has already expired.

Description

This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and
reports whether any have already expired.

Solution

Purchase or generate a new SSL certificate to replace the existing one.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Plugin Information

Published: 2004/12/03, Modified: 2021/02/03

Plugin Output

tcp/5432/postgresql

The SSL certificate has already expired :

Subject : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,


OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
[email protected]
Issuer : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA,
OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain,
[email protected]
Not valid before : Mar 17 14:07:45 2010 GMT
Not valid after : Apr 16 14:07:45 2010 GMT

192.168.1.38 310
45411 - SSL Certificate with Wrong Hostname

Synopsis

The SSL certificate for this service is for a different host.

Description

The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.

Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Plugin Information

Published: 2010/04/03, Modified: 2020/04/27

Plugin Output

tcp/25/smtp

The identities known by Nessus are :

127.0.0.1
192.168.1.38
2401:4900:1f29:3cec:a00:27ff:fe68:92c1
::1
['ipv6': 2401:4900:1f29:3cec:a00:27ff:fe68:92c1]['scope': global]['prefixlen': 64]
['ipv6': ::1]['scope': host]['prefixlen': 128]
['ipv6': fe80::a00:27ff:fe68:92c1]['scope': link]['prefixlen': 64]
fe80::a00:27ff:fe68:92c1
metasploitable
192.168.1.38

The Common Name in the certificate is :

ubuntu804-base.localdomain

192.168.1.38 311
45411 - SSL Certificate with Wrong Hostname

Synopsis

The SSL certificate for this service is for a different host.

Description

The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.

Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Plugin Information

Published: 2010/04/03, Modified: 2020/04/27

Plugin Output

tcp/5432/postgresql

The identities known by Nessus are :

127.0.0.1
192.168.1.38
2401:4900:1f29:3cec:a00:27ff:fe68:92c1
::1
['ipv6': 2401:4900:1f29:3cec:a00:27ff:fe68:92c1]['scope': global]['prefixlen': 64]
['ipv6': ::1]['scope': host]['prefixlen': 128]
['ipv6': fe80::a00:27ff:fe68:92c1]['scope': link]['prefixlen': 64]
fe80::a00:27ff:fe68:92c1
metasploitable
192.168.1.38

The Common Name in the certificate is :

ubuntu804-base.localdomain

192.168.1.38 312
89058 - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened
eNcryption)

Synopsis

The remote host may be affected by a vulnerability that allows a remote attacker to potentially decrypt
captured TLS traffic.

Description

The remote host supports SSLv2 and therefore may be affected by a vulnerability that allows a cross-
protocol Bleichenbacher padding oracle attack known as DROWN (Decrypting RSA with Obsolete and
Weakened eNcryption). This vulnerability exists due to a flaw in the Secure Sockets Layer Version 2 (SSLv2)
implementation, and it allows captured TLS traffic to be decrypted. A man-in-the-middle attacker can
exploit this to decrypt the TLS connection by utilizing previously captured traffic and weak cryptography
along with a series of specially crafted connections to an SSLv2 server that uses the same private key.

See Also

https://drownattack.com/
https://drownattack.com/drown-attack-paper.pdf

Solution

Disable SSLv2 and export grade cryptography cipher suites. Ensure that private keys are not used anywhere
with server software that supports SSLv2 connections.

Risk Factor

Medium

CVSS v3.0 Base Score

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v3.0 Temporal Score

5.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

4.4

EPSS Score

0.9434

CVSS v2.0 Base Score

192.168.1.38 313
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

References

BID 83733
CVE CVE-2016-0800
XREF CERT:583776

Plugin Information

Published: 2016/03/01, Modified: 2019/11/20

Plugin Output

tcp/25/smtp

The remote host is affected by SSL DROWN and supports the following
vulnerable cipher suites :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 314
65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)

Synopsis

The remote service supports the use of the RC4 cipher.

Description

The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of
small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.

See Also

https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf

Solution

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with
AES-GCM suites subject to browser and web server support.

Risk Factor

Medium

CVSS v3.0 Base Score

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v3.0 Temporal Score

5.4 (CVSS:3.0/E:U/RL:X/RC:C)

VPR Score

4.4

EPSS Score

0.0076

192.168.1.38 315
CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:ND/RC:C)

References

BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808

Plugin Information

Published: 2013/04/05, Modified: 2021/02/03

Plugin Output

tcp/25/smtp

List of RC4 cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 316
65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)

Synopsis

The remote service supports the use of the RC4 cipher.

Description

The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of
small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of
millions) ciphertexts, the attacker may be able to derive the plaintext.

See Also

https://www.rc4nomore.com/
http://www.nessus.org/u?ac7327a0
http://cr.yp.to/talks/2013.03.12/slides.pdf
http://www.isg.rhul.ac.uk/tls/
https://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf

Solution

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with
AES-GCM suites subject to browser and web server support.

Risk Factor

Medium

CVSS v3.0 Base Score

5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVSS v3.0 Temporal Score

5.4 (CVSS:3.0/E:U/RL:X/RC:C)

VPR Score

4.4

EPSS Score

0.0076

192.168.1.38 317
CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:ND/RC:C)

References

BID 58796
BID 73684
CVE CVE-2013-2566
CVE CVE-2015-2808

Plugin Information

Published: 2013/04/05, Modified: 2021/02/03

Plugin Output

tcp/5432/postgresql

List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 318
57582 - SSL Self-Signed Certificate

Synopsis

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

Description

The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote
host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-
middle attack against the remote host.

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but
is signed by an unrecognized certificate authority.

Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Plugin Information

Published: 2012/01/17, Modified: 2022/06/14

Plugin Output

tcp/25/smtp

The following certificate was found at the top of the certificate


chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

192.168.1.38 319
57582 - SSL Self-Signed Certificate

Synopsis

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

Description

The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote
host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-
middle attack against the remote host.

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but
is signed by an unrecognized certificate authority.

Solution

Purchase or generate a proper SSL certificate for this service.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

Plugin Information

Published: 2012/01/17, Modified: 2022/06/14

Plugin Output

tcp/5432/postgresql

The following certificate was found at the top of the certificate


chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for


Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-
base.localdomain

192.168.1.38 320
26928 - SSL Weak Cipher Suites Supported

Synopsis

The remote service supports the use of weak SSL ciphers.

Description

The remote host supports the use of SSL ciphers that offer weak encryption.

Note: This is considerably easier to exploit if the attacker is on the same physical network.

See Also

http://www.nessus.org/u?6527892d

Solution

Reconfigure the affected application, if possible to avoid the use of weak ciphers.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

References

XREF CWE:326
XREF CWE:327
XREF CWE:720
XREF CWE:753
XREF CWE:803
XREF CWE:928
XREF CWE:934

Plugin Information

Published: 2007/10/08, Modified: 2021/02/03

Plugin Output

192.168.1.38 321
tcp/25/smtp

Here is the list of weak SSL ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 322
81606 - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)

Synopsis

The remote host supports a set of weak ciphers.

Description

The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker
can factor a 512-bit RSA modulus in a short amount of time.

A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g.
CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.

See Also

https://www.smacktls.com/#freak
https://www.openssl.org/news/secadv/20150108.txt
http://www.nessus.org/u?b78da2c4

Solution

Reconfigure the service to remove support for EXPORT_RSA cipher suites.

Risk Factor

Medium

VPR Score

3.7

EPSS Score

0.9488

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

References

BID 71936
CVE CVE-2015-0204

192.168.1.38 323
XREF CERT:243585

Plugin Information

Published: 2015/03/04, Modified: 2021/02/03

Plugin Output

tcp/25/smtp

EXPORT_RSA cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 324
104743 - TLS Version 1.0 Protocol Detection

Synopsis

The remote service encrypts traffic using an older version of TLS.

Description

The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like
1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly
with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.

See Also

https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00

Solution

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVSS v2.0 Base Score

6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)

References

XREF CWE:327

Plugin Information

Published: 2017/11/22, Modified: 2023/04/19

Plugin Output

192.168.1.38 325
tcp/25/smtp

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.38 326
104743 - TLS Version 1.0 Protocol Detection

Synopsis

The remote service encrypts traffic using an older version of TLS.

Description

The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic
design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like
1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly
with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and
the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any
known exploits.

See Also

https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00

Solution

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVSS v2.0 Base Score

6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)

References

XREF CWE:327

Plugin Information

Published: 2017/11/22, Modified: 2023/04/19

Plugin Output

192.168.1.38 327
tcp/5432/postgresql

TLSv1 is enabled and the server supports at least one cipher.

192.168.1.38 328
36805 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : dbus vulnerabilities (USN-653-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Havoc Pennington discovered that the D-Bus daemon did not correctly validate certain security policies.
If a local user sent a specially crafted D-Bus request, they could bypass security policies that had a
'send_interface' defined. (CVE-2008-0595)

It was discovered that the D-Bus library did not correctly validate certain corrupted signatures. If a local
user sent a specially crafted D-Bus request, they could crash applications linked against the D-Bus library,
leading to a denial of service. (CVE-2008-3834).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/653-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

7.3

EPSS Score

0.0112

CVSS v2.0 Base Score

4.6 (CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

References

CVE CVE-2008-0595
CVE CVE-2008-3834
XREF USN:653-1

192.168.1.38 329
XREF CWE:20
XREF CWE:264

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libdbus-1-3_1.1.20-1ubuntu1


- Fixed package : libdbus-1-3_1.1.20-1ubuntu3.1

192.168.1.38 330
34094 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : libxml2 vulnerability (USN-640-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Andreas Solberg discovered that libxml2 did not handle recursive entities safely. If an application linked
against libxml2 were made to process a specially crafted XML document, a remote attacker could exhaust
the system's CPU resources, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/640-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0073

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 30783
CVE CVE-2008-3281
XREF USN:640-1

192.168.1.38 331
XREF CWE:399

Plugin Information

Published: 2008/09/05, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.1

192.168.1.38 332
33941 - Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : postfix vulnerability (USN-636-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Sebastian Krahmer discovered that Postfix was not correctly handling mailbox ownership when dealing
with Linux's implementation of hardlinking to symlinks. In certain mail spool configurations, a local attacker
could exploit this to append data to arbitrary files as the root user. The default Ubuntu configuration was
not vulnerable.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/636-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

8.9

EPSS Score

0.0005

CVSS v2.0 Base Score

6.2 (CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

4.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 30691
CVE CVE-2008-2936

192.168.1.38 333
XREF USN:636-1
XREF CWE:264

Plugin Information

Published: 2008/08/20, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : postfix_2.5.1-2ubuntu1


- Fixed package : postfix_2.5.1-2ubuntu1.1

192.168.1.38 334
37148 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : curl vulnerability (USN-726-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that curl did not enforce any restrictions when following URL redirects. If a user or
automated system were tricked into opening a URL to an untrusted server, an attacker could use redirects
to gain access to arbitrary files. This update changes curl behavior to prevent following 'file' URLs after a
redirect.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/726-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0066

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 33962
CVE CVE-2009-0037

192.168.1.38 335
XREF USN:726-1
XREF CWE:352

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libcurl3-gnutls_7.18.0-1ubuntu2


- Fixed package : libcurl3-gnutls_7.18.0-1ubuntu2.1

192.168.1.38 336
37045 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : gnutls12, gnutls13, gnutls26 regression
(USN-678-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-678-1 fixed a vulnerability in GnuTLS. The upstream patch introduced a regression when validating
certain certificate chains that would report valid certificates as untrusted. This update fixes the problem.

We apologize for the inconvenience.

Martin von Gagern discovered that GnuTLS did not properly verify certificate chains when the last
certificate in the chain was self-signed. If a remote attacker were able to perform a man-in-the-middle
attack, this flaw could be exploited to view sensitive information. (CVE-2008-4989).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/678-2/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0019

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

References

CVE CVE-2008-4989
XREF USN:678-2

192.168.1.38 337
XREF CWE:255

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libgnutls13_2.0.4-1ubuntu2


- Fixed package : libgnutls13_2.0.4-1ubuntu2.3

192.168.1.38 338
37965 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : gnutls12, gnutls13, gnutls26 vulnerability
(USN-678-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Martin von Gagern discovered that GnuTLS did not properly verify certificate chains when the last
certificate in the chain was self-signed. If a remote attacker were able to perform a man-in-the-middle
attack, this flaw could be exploited to view sensitive information. (CVE-2008-4989).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/678-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0019

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

References

CVE CVE-2008-4989
XREF USN:678-1
XREF CWE:255

Plugin Information

192.168.1.38 339
Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libgnutls13_2.0.4-1ubuntu2


- Fixed package : libgnutls13_2.0.4-1ubuntu2.2

192.168.1.38 340
36382 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : openssl vulnerability (USN-704-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenSSL did not properly perform signature verification on DSA and ECDSA keys.
If user or automated system connected to a malicious server or a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to view sensitive information.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/704-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.0

EPSS Score

0.0075

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVSS v2.0 Temporal Score

4.3 (CVSS2#E:U/RL:OF/RC:C)

References

BID 33150
CVE CVE-2008-5077
XREF USN:704-1

192.168.1.38 341
XREF CWE:20

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.4

192.168.1.38 342
36907 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : openssl vulnerability (USN-750-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenSSL did not properly validate the length of an encoded BMPString or
UniversalString when printing ASN.1 strings.
If a user or automated system were tricked into processing a crafted certificate, an attacker could cause a
denial of service via application crash in applications linked against OpenSSL.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/750-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.2707

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

4.3 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 34256
CVE CVE-2009-0590

192.168.1.38 343
XREF USN:750-1
XREF CWE:119

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.5

192.168.1.38 344
36589 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : apache2 vulnerabilities (USN-731-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that Apache did not sanitize the method specifier header from an HTTP request when it
is returned in an error message, which could result in browsers becoming vulnerable to cross-site scripting
attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into
viewing server output during a crafted server request, a remote attacker could exploit this to modify the
contents, or steal confidential data (such as passwords), within the same domain. This issue only affected
Ubuntu 6.06 LTS and 7.10. (CVE-2007-6203)

It was discovered that Apache was vulnerable to a cross-site request forgery (CSRF) in the
mod_proxy_balancer balancer manager. If an Apache administrator were tricked into clicking a link on a
specially crafted web page, an attacker could trigger commands that could modify the balancer manager
configuration. This issue only affected Ubuntu 7.10 and 8.04 LTS. (CVE-2007-6420)

It was discovered that Apache had a memory leak when using mod_ssl with compression. A remote
attacker could exploit this to exhaust server memory, leading to a denial of service. This issue only affected
Ubuntu 7.10. (CVE-2008-1678)

It was discovered that in certain conditions, Apache did not specify a default character set when returning
certain error messages containing UTF-7 encoded data, which could result in browsers becoming
vulnerable to cross-site scripting attacks when processing the output. This issue only affected Ubuntu 6.06
LTS and 7.10. (CVE-2008-2168)

It was discovered that when configured as a proxy server, Apache did not limit the number of forwarded
interim responses. A malicious remote server could send a large number of interim responses and cause a
denial of service via memory exhaustion. (CVE-2008-2364)

It was discovered that mod_proxy_ftp did not sanitize wildcard pathnames when they are returned in
directory listings, which could result in browsers becoming vulnerable to cross-site scripting attacks when
processing the output. (CVE-2008-2939).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/731-1/

Solution

Update the affected packages.

Risk Factor

Medium

192.168.1.38 345
VPR Score

4.4

EPSS Score

0.9713

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 26663
BID 27236
BID 29653
BID 30560
BID 31692
CVE CVE-2007-6203
CVE CVE-2007-6420
CVE CVE-2008-1678
CVE CVE-2008-2168
CVE CVE-2008-2364
CVE CVE-2008-2939
XREF USN:731-1
XREF CWE:79
XREF CWE:352
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.4

192.168.1.38 346
37299 - Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : mysql-dfsg-5.0 vulnerabilities (USN-671-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that MySQL could be made to overwrite existing table files in the data directory. An
authenticated user could use the DATA DIRECTORY and INDEX DIRECTORY options to possibly bypass
privilege checks. This update alters table creation behaviour by disallowing the use of the MySQL data
directory in DATA DIRECTORY and INDEX DIRECTORY options. (CVE-2008-2079, CVE-2008-4097 and
CVE-2008-4098)

It was discovered that MySQL did not handle empty bit-string literals properly. An attacker could exploit this
problem and cause the MySQL server to crash, leading to a denial of service. (CVE-2008-3963).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/671-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.3

EPSS Score

0.0562

CVSS v2.0 Base Score

4.6 (CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P)

References

CVE CVE-2008-2079
CVE CVE-2008-3963

192.168.1.38 347
CVE CVE-2008-4097
CVE CVE-2008-4098
XREF USN:671-1
XREF CWE:59
XREF CWE:134
XREF CWE:264

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libmysqlclient15off_5.0.51a-3ubuntu5


- Fixed package : libmysqlclient15off_5.0.51a-3ubuntu5.4

- Installed package : mysql-client-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-client-5.0_5.0.51a-3ubuntu5.4

- Installed package : mysql-common_5.0.51a-3ubuntu5


- Fixed package : mysql-common_5.0.51a-3ubuntu5.4

- Installed package : mysql-server_5.0.51a-3ubuntu5


- Fixed package : mysql-server_5.0.51a-3ubuntu5.4

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.51a-3ubuntu5.4

192.168.1.38 348
55095 - Ubuntu 6.06 LTS / 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : apache2, apr vulnerabilities
(USN-1134-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Maksymilian Arciemowicz reported that a flaw in the fnmatch() implementation in the Apache Portable
Runtime (APR) library could allow an attacker to cause a denial of service. This can be demonstrated in a
remote denial of service attack against mod_autoindex in the Apache web server. (CVE-2011-0419)

Is was discovered that the fix for CVE-2011-0419 introduced a different flaw in the fnmatch()
implementation that could also result in a denial of service. (CVE-2011-1928).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1134-1/

Solution

Update the affected libapr0 and / or libapr1 packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.9681

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.4 (CVSS2#E:POC/RL:OF/RC:C)

References

192.168.1.38 349
BID 47820
BID 47929
CVE CVE-2011-0419
CVE CVE-2011-1928
XREF USN:1134-1

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libapr1_1.2.11-1


- Fixed package : libapr1_1.2.11-1ubuntu0.2

192.168.1.38 350
55092 - Ubuntu 6.06 LTS / 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : postfix vulnerability (USN-1131-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Thomas Jarosch discovered that Postfix incorrectly handled authentication mechanisms other than PLAIN
and LOGIN when the Cyrus SASL library is used. A remote attacker could use this to cause Postfix to crash,
leading to a denial of service, or possibly execute arbitrary code as the postfix user.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1131-1/

Solution

Update the affected postfix package.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.8866

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 47778
CVE CVE-2011-1720
XREF USN:1131-1

192.168.1.38 351
Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postfix_2.5.1-2ubuntu1


- Fixed package : postfix_2.5.1-2ubuntu1.4

192.168.1.38 352
45037 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : apache2 vulnerabilities (USN-908-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that mod_proxy_ajp did not properly handle errors when a client doesn't send a request
body. A remote attacker could exploit this with a crafted request and cause a denial of service.
This issue affected Ubuntu 8.04 LTS, 8.10, 9.04 and 9.10.
(CVE-2010-0408)

It was discovered that Apache did not properly handle headers in subrequests under certain conditions.
A remote attacker could exploit this with a crafted request and possibly obtain sensitive information from
previous requests. (CVE-2010-0434).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/908-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.5

EPSS Score

0.1188

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 353
References

BID 38491
BID 38580
CVE CVE-2010-0408
CVE CVE-2010-0434
XREF USN:908-1
XREF CWE:200

Plugin Information

Published: 2010/03/11, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.15

192.168.1.38 354
45038 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : dpkg vulnerability (USN-909-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

William Grant discovered that dpkg-source did not safely apply diffs when unpacking source packages. If
a user or an automated system were tricked into unpacking a specially crafted source package, a remote
attacker could modify files outside the target unpack directory, leading to a denial of service or potentially
gaining access to the system.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/909-1/

Solution

Update the affected dpkg, dpkg-dev and / or dselect packages.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0031

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

References

CVE CVE-2010-0396
XREF USN:909-1

Plugin Information

Published: 2010/03/11, Modified: 2019/09/19

192.168.1.38 355
Plugin Output

tcp/0

- Installed package : dpkg_1.14.16.6ubuntu3


- Fixed package : dpkg_1.14.16.6ubuntu4.1

192.168.1.38 356
44108 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : expat vulnerabilities (USN-890-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Jukka Taimisto, Tero Rontti and Rauli Kaksonen discovered that Expat did not properly process malformed
XML. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker
could cause a denial of service via application crash.
(CVE-2009-2625, CVE-2009-3720)

It was discovered that Expat did not properly process malformed UTF-8 sequences. If a user or application
linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service
via application crash. (CVE-2009-3560).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/890-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.1716

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 357
References

BID 35958
BID 36097
BID 37203
CVE CVE-2009-2625
CVE CVE-2009-3560
CVE CVE-2009-3720
XREF USN:890-1
XREF CWE:119
XREF CWE:264

Plugin Information

Published: 2010/01/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libexpat1_2.0.1-0ubuntu1


- Fixed package : libexpat1_2.0.1-0ubuntu1.1

192.168.1.38 358
44107 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : gzip vulnerabilities (USN-889-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that gzip incorrectly handled certain malformed compressed files. If a user or automated
system were tricked into opening a specially crafted gzip file, an attacker could cause gzip to crash or
possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2009-2624)

Aki Helin discovered that gzip incorrectly handled certain malformed files compressed with the Lempel-
Ziv-Welch (LZW) algorithm. If a user or automated system were tricked into opening a specially crafted gzip
file, an attacker could cause gzip to crash or possibly execute arbitrary code with the privileges of the user
invoking the program.
(CVE-2010-0001).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/889-1/

Solution

Update the affected gzip package.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.1551

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 359
References

CVE CVE-2009-2624
CVE CVE-2010-0001
XREF USN:889-1
XREF CWE:20
XREF CWE:189

Plugin Information

Published: 2010/01/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : gzip_1.3.12-3.2


- Fixed package : gzip_1.3.12-3.2ubuntu0.1

192.168.1.38 360
42408 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : libhtml-parser-perl vulnerability
(USN-855-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Mark Martinec discovered that HTML::Parser incorrectly handled strings with incomplete entities. An
attacker could send specially crafted input to applications that use HTML::Parser and cause a denial of
service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/855-1/

Solution

Update the affected libhtml-parser-perl package.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0022

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

References

CVE CVE-2009-3627
XREF USN:855-1
XREF CWE:20

Plugin Information

192.168.1.38 361
Published: 2009/11/06, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libhtml-parser-perl_3.56-1


- Fixed package : libhtml-parser-perl_3.56-1ubuntu0.1

192.168.1.38 362
45081 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : linux, linux-source-2.6.15 vulnerabilities
(USN-914-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Mathias Krause discovered that the Linux kernel did not correctly handle missing ELF interpreters. A local
attacker could exploit this to cause the system to crash, leading to a denial of service.
(CVE-2010-0307)

Marcelo Tosatti discovered that the Linux kernel's hardware virtualization did not correctly handle reading
the /dev/port special device. A local attacker in a guest operating system could issue a specific read that
would cause the host system to crash, leading to a denial of service. (CVE-2010-0309)

Sebastian Krahmer discovered that the Linux kernel did not correctly handle netlink connector messages. A
local attacker could exploit this to consume kernel memory, leading to a denial of service.
(CVE-2010-0410)

Ramon de Carvalho Valle discovered that the Linux kernel did not correctly validate certain memory
migration calls. A local attacker could exploit this to read arbitrary kernel memory or cause a system crash,
leading to a denial of service. (CVE-2010-0415)

Jermome Marchand and Mikael Pettersson discovered that the Linux kernel did not correctly handle certain
futex operations. A local attacker could exploit this to cause a system crash, leading to a denial of service.
(CVE-2010-0622, CVE-2010-0623).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/914-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

9.2

EPSS Score

192.168.1.38 363
0.0035

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 38027
BID 38058
BID 38144
BID 38165
CVE CVE-2010-0307
CVE CVE-2010-0309
CVE CVE-2010-0410
CVE CVE-2010-0415
CVE CVE-2010-0622
CVE CVE-2010-0623
XREF USN:914-1
XREF CWE:16
XREF CWE:20
XREF CWE:399

Plugin Information

Published: 2010/03/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-27.68

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 364
43898 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : openssl vulnerability (USN-884-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenSSL did not correctly free unused memory in certain situations. A remote
attacker could trigger this flaw in services that used SSL, causing the service to use all available system
memory, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/884-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.2035

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 31692
CVE CVE-2009-4355
XREF USN:884-1

192.168.1.38 365
XREF CWE:399

Plugin Information

Published: 2010/01/14, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.9

192.168.1.38 366
43622 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : postgresql-8.1, postgresql-8.3,
postgresql-8.4 vulnerabilities (USN-876-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL did not properly handle certificates with NULL characters in the
Common Name field of X.509 certificates.
An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter
encrypted communications.
(CVE-2009-4034)

It was discovered that PostgreSQL did not properly manage session-local state. A remote authenticated
user could exploit this to escalate priviliges within PostgreSQL. (CVE-2009-4136).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/876-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0234

CVSS v2.0 Base Score

6.5 (CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

4.8 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 367
References

BID 37333
BID 37334
CVE CVE-2009-4034
CVE CVE-2009-4136
XREF USN:876-1
XREF CWE:310

Plugin Information

Published: 2010/01/04, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.9-0ubuntu8.04

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.9-0ubuntu8.04

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.9-0ubuntu8.04

192.168.1.38 368
44336 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : samba vulnerability (USN-893-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Ronald Volgers discovered that the mount.cifs utility, when installed as a setuid program, suffered from
a race condition when verifying user permissions. A local attacker could trick samba into mounting over
arbitrary locations, leading to a root privilege escalation.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/893-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0006

CVSS v2.0 Base Score

4.4 (CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P)

References

CVE CVE-2010-0787
XREF USN:893-1
XREF CWE:59

Plugin Information

Published: 2010/01/29, Modified: 2019/09/19

192.168.1.38 369
Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.10

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.10

192.168.1.38 370
44936 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : sudo vulnerabilities (USN-905-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that sudo did not properly validate the path for the 'sudoedit' pseudo-command. A
local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the
attacker to use sudoedit. The sudoedit pseudo-command is not used in the default installation of Ubuntu.
(CVE-2010-0426)

It was discovered that sudo did not reset group permissions when the 'runas_default' configuration option
was used. A local attacker could exploit this to escalate group privileges if sudo was configured to allow the
attacker to run commands under the runas_default account.
The runas_default configuration option is not used in the default installation of Ubuntu. This issue affected
Ubuntu 8.04 LTS, 8.10 and 9.04. (CVE-2010-0427).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/905-1/

Solution

Update the affected sudo and / or sudo-ldap packages.

Risk Factor

Medium

VPR Score

7.4

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.7 (CVSS2#E:F/RL:OF/RC:C)

192.168.1.38 371
References

BID 38362
BID 38432
CVE CVE-2010-0426
CVE CVE-2010-0427
XREF USN:905-1
XREF CWE:264

Exploitable With

Core Impact (true)

Plugin Information

Published: 2010/03/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : sudo_1.6.9p10-1ubuntu3


- Fixed package : sudo_1.6.9p10-1ubuntu3.6

192.168.1.38 372
45550 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : sudo vulnerability (USN-928-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Valerio Costamagna discovered that sudo did not properly validate the path for the 'sudoedit' pseudo-
command when the PATH contained only a dot ('.'). If secure_path and ignore_dot were disabled, a local
attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to
use sudoedit. By default, secure_path is used and the sudoedit pseudo-command is not used in Ubuntu.
This is a different but related issue to CVE-2010-0426.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/928-1/

Solution

Update the affected sudo and / or sudo-ldap packages.

Risk Factor

Medium

VPR Score

7.4

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.7 (CVSS2#E:F/RL:OF/RC:C)

References

BID 39468

192.168.1.38 373
CVE CVE-2010-0426
XREF USN:928-1
XREF CWE:264

Exploitable With

Core Impact (true)

Plugin Information

Published: 2010/04/16, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : sudo_1.6.9p10-1ubuntu3


- Fixed package : sudo_1.6.9p10-1ubuntu3.7

192.168.1.38 374
40417 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : bind9 vulnerability (USN-808-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Micha Krause discovered that Bind did not correctly validate certain dynamic DNS update packets. An
unauthenticated remote attacker could send specially crafted traffic to crash the DNS server, leading to a
denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/808-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.1

EPSS Score

0.9639

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

References

CVE CVE-2009-0696
XREF USN:808-1
XREF CWE:16

Exploitable With

Core Impact (true)

192.168.1.38 375
Plugin Information

Published: 2009/07/29, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : bind9_1:9.4.2-10


- Fixed package : bind9_1:9.4.2.dfsg.P2-2ubuntu0.2

192.168.1.38 376
41624 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : newt vulnerability (USN-837-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Miroslav Lichvar discovered that Newt incorrectly handled rendering in a text box. An attacker could exploit
this and cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking
the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/837-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.0004

CVSS v2.0 Base Score

4.6 (CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

3.4 (CVSS2#E:U/RL:OF/RC:C)

References

CVE CVE-2009-2905
XREF USN:837-1
XREF CWE:119

192.168.1.38 377
Plugin Information

Published: 2009/09/25, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libnewt0.52_0.52.2-11.2ubuntu1


- Fixed package : libnewt0.52_0.52.2-11.2ubuntu1.1

- Installed package : whiptail_0.52.2-11.2ubuntu1


- Fixed package : whiptail_0.52.2-11.2ubuntu1.1

192.168.1.38 378
39534 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : openssl vulnerabilities (USN-792-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived
with a future epoch. A remote attacker could cause a denial of service via memory resource consumption
by sending a large number of crafted requests.
(CVE-2009-1377)

It was discovered that OpenSSL did not properly free memory when processing DTLS fragments. A remote
attacker could cause a denial of service via memory resource consumption by sending a large number of
crafted requests. (CVE-2009-1378)

It was discovered that OpenSSL did not properly handle certain server certificates when processing DTLS
packets. A remote DTLS server could cause a denial of service by sending a message containing a specially
crafted server certificate. (CVE-2009-1379)

It was discovered that OpenSSL did not properly handle a DTLS ChangeCipherSpec packet when it occured
before ClientHello. A remote attacker could cause a denial of service by sending a specially crafted request.
(CVE-2009-1386)

It was discovered that OpenSSL did not properly handle out of sequence DTLS handshake messages. A
remote attacker could cause a denial of service by sending a specially crafted request. (CVE-2009-1387).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/792-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.1

EPSS Score

0.1173

192.168.1.38 379
CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

4.1 (CVSS2#E:F/RL:OF/RC:C)

References

BID 35001
BID 35138
BID 35174
BID 35417
CVE CVE-2009-1377
CVE CVE-2009-1378
CVE CVE-2009-1379
CVE CVE-2009-1386
CVE CVE-2009-1387
XREF USN:792-1
XREF CWE:119
XREF CWE:399

Exploitable With

Core Impact (true)

Plugin Information

Published: 2009/06/26, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.7

192.168.1.38 380
40981 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : openssl vulnerability (USN-830-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Kaminsky discovered OpenSSL would still accept certificates with MD2 hash signatures. As a result, an
attacker could potentially create a malicious trusted certificate to impersonate another site. This update
handles this issue by completely disabling MD2 for certificate validation.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/830-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0137

CVSS v2.0 Base Score

5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

References

CVE CVE-2009-2409
XREF USN:830-1
XREF CWE:310

Plugin Information

Published: 2009/09/15, Modified: 2021/01/19

192.168.1.38 381
Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.8

192.168.1.38 382
41045 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : postgresql-8.1, postgresql-8.3 vulnerabilities
(USN-834-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL could be made to unload and reload an already loaded module by using
the LOAD command. A remote authenticated attacker could exploit this to cause a denial of service. This
issue did not affect Ubuntu 6.06 LTS. (CVE-2009-3229)

Due to an incomplete fix for CVE-2007-6600, RESET ROLE and RESET SESSION AUTHORIZATION operations
were allowed inside security-definer functions. A remote authenticated attacker could exploit this to
escalate privileges within PostgreSQL. (CVE-2009-3230)

It was discovered that PostgreSQL did not properly perform LDAP authentication under certain
circumstances. When configured to use LDAP with anonymous binds, a remote attacker could
bypass authentication by supplying an empty password. This issue did not affect Ubuntu 6.06 LTS.
(CVE-2009-3231).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/834-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0142

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

192.168.1.38 383
CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 36314
CVE CVE-2007-6600
CVE CVE-2009-3229
CVE CVE-2009-3230
CVE CVE-2009-3231
XREF USN:834-1
XREF CWE:264
XREF CWE:287

Plugin Information

Published: 2009/09/22, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.8-0ubuntu8.04

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.8-0ubuntu8.04

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.8-0ubuntu8.04

192.168.1.38 384
42050 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : wget vulnerability (USN-842-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that Wget did not correctly handle SSL certificates with zero bytes in the Common Name.
A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or
alter encrypted communications.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/842-1/

Solution

Update the affected wget package.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.0041

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 36205
CVE CVE-2009-3490
XREF USN:842-1

192.168.1.38 385
XREF CWE:310

Plugin Information

Published: 2009/10/07, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : wget_1.10.2-3ubuntu1


- Fixed package : wget_1.10.2-3ubuntu1.1

192.168.1.38 386
37152 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 : postgresql-8.1, postgresql-8.3 vulnerability (USN-753-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL did not properly handle encoding conversion failures. An attacker could
exploit this by sending specially crafted requests to PostgreSQL, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/753-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0203

CVSS v2.0 Base Score

4.0 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 34090
CVE CVE-2009-0922
XREF USN:753-1

192.168.1.38 387
XREF CWE:399

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.7-0ubuntu8.04.1

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.7-0ubuntu8.04.1

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.7-0ubuntu8.04.1

192.168.1.38 388
49644 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : apache2 vulnerability (USN-990-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-860-1 introduced a partial workaround to Apache that disabled client initiated TLS renegotiation in
order to mitigate CVE-2009-3555.
USN-990-1 introduced the new RFC5746 renegotiation extension in openssl, and completely resolves the
issue.

After updating openssl, an Apache server will allow both patched and unpatched web browsers to
connect, but unpatched browsers will not be able to renegotiate. This update introduces the new
SSLInsecureRenegotiation directive for Apache that may be used to re-enable insecure renegotiations with
unpatched web browsers. For more information, please refer to:
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslinsecurerenegotia tion

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. If an attacker could
perform a man in the middle attack at the start of a TLS connection, the attacker could inject arbitrary
content at the beginning of the user's session. This update adds backported support for the new RFC5746
renegotiation extension and will use it when both the client and the server support it.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/990-2/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

7.4

EPSS Score

0.0036

CVSS v2.0 Base Score

192.168.1.38 389
5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVSS v2.0 Temporal Score

4.5 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 36935
CVE CVE-2009-3555
XREF USN:990-2
XREF CWE:310

Plugin Information

Published: 2010/09/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.18

- Installed package : apache2-mpm-prefork_2.2.8-1ubuntu0.15


- Fixed package : apache2-mpm-prefork_2.2.8-1ubuntu0.18

- Installed package : apache2-utils_2.2.8-1ubuntu0.15


- Fixed package : apache2-utils_2.2.8-1ubuntu0.18

- Installed package : apache2.2-common_2.2.8-1ubuntu0.15


- Fixed package : apache2.2-common_2.2.8-1ubuntu0.18

192.168.1.38 390
49303 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : bzip2 vulnerability (USN-986-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

An integer overflow was discovered in bzip2. If a user or automated system were tricked into
decompressing a crafted bz2 file, an attacker could cause bzip2 or any application linked against libbz2 to
crash or possibly execute code as the user running the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/986-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0272

CVSS v2.0 Base Score

5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

3.8 (CVSS2#E:U/RL:OF/RC:C)

STIG Severity

II

192.168.1.38 391
References

CVE CVE-2010-0405
XREF USN:986-1
XREF IAVB:2010-B-0083

Plugin Information

Published: 2010/09/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : bzip2_1.0.4-2ubuntu4


- Fixed package : bzip2_1.0.4-2ubuntu4.1

- Installed package : libbz2-1.0_1.0.4-2ubuntu4


- Fixed package : libbz2-1.0_1.0.4-2ubuntu4.1

192.168.1.38 392
47108 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : cups, cupsys vulnerabilities
(USN-952-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Adrian Pastor and Tim Starling discovered that the CUPS web interface incorrectly protected against
cross-site request forgery (CSRF) attacks. If an authenticated user were tricked into visiting a malicious
website while logged into CUPS, a remote attacker could modify the CUPS configuration and possibly steal
confidential data.
(CVE-2010-0540)

It was discovered that CUPS did not properly handle memory allocations in the texttops filter. If a user or
automated system were tricked into printing a crafted text file, a remote attacker could cause a denial of
service or possibly execute arbitrary code with privileges of the CUPS user (lp). (CVE-2010-0542)

Luca Carettoni discovered that the CUPS web interface incorrectly handled form variables. A remote
attacker who had access to the CUPS web interface could use this flaw to read a limited amount of memory
from the cupsd process and possibly obtain confidential data.
(CVE-2010-1748).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/952-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0126

CVSS v2.0 Base Score

192.168.1.38 393
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.6 (CVSS2#E:F/RL:OF/RC:C)

References

BID 40889
BID 40897
BID 40943
CVE CVE-2010-0540
CVE CVE-2010-0542
CVE CVE-2010-1748
XREF USN:952-1

Plugin Information

Published: 2010/06/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libcupsys2_1.3.7-1ubuntu3.9


- Fixed package : libcupsys2_1.3.7-1ubuntu3.11

192.168.1.38 394
49305 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : dpkg vulnerability (USN-986-3)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-986-1 fixed vulnerabilities in bzip2. dpkg statically links against libbz2 and needed to be rebuilt to use
the updated libbz2.

An integer overflow was discovered in bzip2. If a user or automated system were tricked into
decompressing a crafted bz2 file, an attacker could cause bzip2 or any application linked against libbz2 to
crash or possibly execute code as the user running the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/986-3/

Solution

Update the affected dpkg, dpkg-dev and / or dselect packages.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0272

CVSS v2.0 Base Score

5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

3.8 (CVSS2#E:U/RL:OF/RC:C)

STIG Severity

II

192.168.1.38 395
References

CVE CVE-2010-0405
XREF USN:986-3
XREF IAVB:2010-B-0083

Plugin Information

Published: 2010/09/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : dpkg_1.14.16.6ubuntu3


- Fixed package : dpkg_1.14.16.6ubuntu4.2

- Installed package : dpkg-dev_1.14.16.6ubuntu4.1


- Fixed package : dpkg-dev_1.14.16.6ubuntu4.2

192.168.1.38 396
47778 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : freetype vulnerabilities (USN-963-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Robert Swiecki discovered that FreeType did not correctly handle certain malformed font files. If a user
were tricked into using a specially crafted font file, a remote attacker could execute arbitrary code with user
privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/963-1/

Solution

Update the affected freetype2-demos, libfreetype6 and / or libfreetype6-dev packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0186

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 41663
BID 60750
CVE CVE-2010-2498

192.168.1.38 397
CVE CVE-2010-2499
CVE CVE-2010-2500
CVE CVE-2010-2519
CVE CVE-2010-2520
CVE CVE-2010-2527
XREF USN:963-1

Plugin Information

Published: 2010/07/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libfreetype6_2.3.5-1ubuntu4.8.04.2


- Fixed package : libfreetype6_2.3.5-1ubuntu4.8.04.3

192.168.1.38 398
49066 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : libwww-perl vulnerability (USN-981-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libwww-perl incorrectly filtered filenames suggested by Content-Disposition headers.
If a user were tricked into downloading a file from a malicious site, a remote attacker could overwrite
hidden files in the user's directory.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/981-1/

Solution

Update the affected libwww-perl package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0039

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.9 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 65722
CVE CVE-2010-2253
XREF USN:981-1

192.168.1.38 399
Plugin Information

Published: 2010/09/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libwww-perl_5.808-1


- Fixed package : libwww-perl_5.808-1ubuntu0.1

192.168.1.38 400
49791 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : lvm2 vulnerability (USN-1001-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

The cluster logical volume manager daemon (clvmd) in LVM2 did not correctly validate credentials. A local
user could use this flaw to manipulate logical volumes without root privileges and cause a denial of service
in the cluster.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1001-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0004

CVSS v2.0 Base Score

4.6 (CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

3.4 (CVSS2#E:U/RL:OF/RC:C)

References

BID 42033
CVE CVE-2010-2526
XREF USN:1001-1

192.168.1.38 401
Plugin Information

Published: 2010/10/07, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : lvm2_2.02.26-1ubuntu9


- Fixed package : lvm2_2.02.26-1ubuntu9.1

192.168.1.38 402
46855 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : mysql-dfsg-5.0, mysql-dfsg-5.1
vulnerabilities (USN-950-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that MySQL did not check privileges before uninstalling plugins. An authenticated user
could uninstall arbitrary plugins, bypassing intended restrictions. This issue only affected Ubuntu 9.10 and
10.04 LTS. (CVE-2010-1621)

It was discovered that MySQL could be made to delete another user's data and index files. An
authenticated user could use symlinks combined with the DROP TABLE command to possibly bypass
privilege checks. (CVE-2010-1626)

It was discovered that MySQL incorrectly validated the table name argument of the COM_FIELD_LIST
command. An authenticated user could use a specially- crafted table name to bypass privilege checks and
possibly access other tables. (CVE-2010-1848)

Eric Day discovered that MySQL incorrectly handled certain network packets. A remote attacker could
exploit this flaw and cause the server to consume all available resources, resulting in a denial of service.
(CVE-2010-1849)

It was discovered that MySQL performed incorrect bounds checking on the table name argument of the
COM_FIELD_LIST command. An authenticated user could use a specially crafted table name to cause a
denial of service or possibly execute arbitrary code. The default compiler options for affected releases
should reduce the vulnerability to a denial of service. (CVE-2010-1850).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/950-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

7.4

EPSS Score

192.168.1.38 403
0.9202

CVSS v2.0 Base Score

6.5 (CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 39543
BID 40100
BID 40106
BID 40109
BID 40257
CVE CVE-2010-1621
CVE CVE-2010-1626
CVE CVE-2010-1848
CVE CVE-2010-1849
CVE CVE-2010-1850
XREF USN:950-1

Exploitable With

CANVAS (true)

Plugin Information

Published: 2010/06/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libmysqlclient15off_5.0.51a-3ubuntu5


- Fixed package : libmysqlclient15off_5.0.51a-3ubuntu5.7

- Installed package : mysql-client-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-client-5.0_5.0.51a-3ubuntu5.7

- Installed package : mysql-common_5.0.51a-3ubuntu5


- Fixed package : mysql-common_5.0.51a-3ubuntu5.7

- Installed package : mysql-server_5.0.51a-3ubuntu5


- Fixed package : mysql-server_5.0.51a-3ubuntu5.7

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.51a-3ubuntu5.7

192.168.1.38 404
192.168.1.38 405
48282 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : openldap, openldap2.2, openldap2.3
vulnerabilities (USN-965-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomaki discovered that the
slap_modrdn2mods function in modrdn.c in OpenLDAP does not check the return value from a call to the
smr_normalize function. A remote attacker could use specially crafted modrdn requests to crash the slapd
daemon or possibly execute arbitrary code. (CVE-2010-0211)

Using the Codenomicon LDAPv3 test suite, Ilkka Mattila and Tuomas Salomaki discovered that OpenLDAP
does not properly handle empty RDN strings. A remote attacker could use specially crafted modrdn
requests to crash the slapd daemon. (CVE-2010-0212)

In the default installation under Ubuntu 8.04 LTS and later, attackers would be isolated by the OpenLDAP
AppArmor profile for the slapd daemon.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/965-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.9651

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 406
4.1 (CVSS2#E:F/RL:OF/RC:C)

References

BID 41770
CVE CVE-2010-0211
CVE CVE-2010-0212
XREF USN:965-1

Exploitable With

Core Impact (true)

Plugin Information

Published: 2010/08/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libldap-2.4-2_2.4.9-0ubuntu0.8.04.3


- Fixed package : libldap-2.4-2_2.4.9-0ubuntu0.8.04.4

- Installed package : libldap2-dev_2.4.9-0ubuntu0.8.04.3


- Fixed package : libldap2-dev_2.4.9-0ubuntu0.8.04.4

192.168.1.38 407
49643 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : openssl vulnerability (USN-990-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Marsh Ray and Steve Dispensa discovered a flaw in the TLS and SSLv3 protocols. If an attacker could
perform a man in the middle attack at the start of a TLS connection, the attacker could inject arbitrary
content at the beginning of the user's session. This update adds backported support for the new RFC5746
renegotiation extension and will use it when both the client and the server support it.

ATTENTION: After applying this update, a patched server will allow both patched and unpatched clients to
connect, but unpatched clients will not be able to renegotiate. For more information, please refer to the
following:
http://www.openssl.org/docs/ssl/SSL_CTX_set_options.html#SECURE_RENEGO TIATION.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/990-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

7.4

EPSS Score

0.0036

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVSS v2.0 Temporal Score

4.5 (CVSS2#E:POC/RL:OF/RC:C)

192.168.1.38 408
References

BID 36935
CVE CVE-2009-3555
XREF USN:990-1
XREF CWE:310

Plugin Information

Published: 2010/09/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.10

192.168.1.38 409
49803 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : postgresql-8.1, postgresql-8.3,
postgresql-8.4 vulnerability (USN-1002-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL did not properly enforce permissions within sessions when PL/Perl and
PL/Tcl functions or operators were redefined. A remote authenticated attacker could exploit this to execute
arbitrary code with permissions of a different user, possibly leading to privilege escalation.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1002-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0345

CVSS v2.0 Base Score

6.0 (CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

4.4 (CVSS2#E:U/RL:OF/RC:C)

References

BID 43747
CVE CVE-2010-3433

192.168.1.38 410
XREF USN:1002-1

Plugin Information

Published: 2010/10/08, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.12-0ubuntu8.04

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.12-0ubuntu8.04

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.12-0ubuntu8.04

192.168.1.38 411
47575 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : sudo vulnerability (USN-956-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Evan Broder and Anders Kaseorg discovered that sudo did not properly sanitize its environment when
configured to use secure_path (the default in Ubuntu). A local attacker could exploit this to execute
arbitrary code as root if sudo was configured to allow the attacker to use a program that interpreted the
PATH environment variable.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/956-1/

Solution

Update the affected sudo and / or sudo-ldap packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0004

CVSS v2.0 Base Score

6.2 (CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

4.6 (CVSS2#E:U/RL:OF/RC:C)

References

BID 40538
CVE CVE-2010-1646

192.168.1.38 412
XREF USN:956-1

Plugin Information

Published: 2010/07/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : sudo_1.6.9p10-1ubuntu3


- Fixed package : sudo_1.6.9p10-1ubuntu3.8

192.168.1.38 413
47110 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : tiff vulnerabilities (USN-954-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Kevin Finisterre discovered that the TIFF library did not correctly handle certain image structures. If a
user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker
could execute arbitrary code with user privileges, or crash the application, leading to a denial of service.
(CVE-2010-1411)

Dan Rosenberg and Sauli Pahlman discovered multiple flaws in the TIFF library. If a user or automated
system were into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code
with user privileges, or crash the application, leading to a denial of service. (Only Ubuntu 10.04 LTS was
affected.) (CVE-2010-2065, CVE-2010-2067).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/954-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0497

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 414
References

BID 40823
CVE CVE-2010-1411
CVE CVE-2010-2065
CVE CVE-2010-2067
XREF USN:954-1

Plugin Information

Published: 2010/06/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.6

192.168.1.38 415
48283 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : w3m vulnerability (USN-967-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Ludwig Nussel discovered w3m does not properly handle SSL/TLS certificates with NULL characters in the
certificate name. An attacker could exploit this to perform a man in the middle attack to view sensitive
information or alter encrypted communications.
(CVE-2010-2074).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/967-1/

Solution

Update the affected w3m and / or w3m-img packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0042

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 40837
CVE CVE-2010-2074

192.168.1.38 416
XREF USN:967-1

Plugin Information

Published: 2010/08/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : w3m_0.5.1-5.1ubuntu1


- Fixed package : w3m_0.5.1-5.1ubuntu1.1

192.168.1.38 417
49102 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : wget vulnerability (USN-982-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that Wget would use filenames provided by the server when following 3xx redirects. If
a user or automated system were tricked into downloading a file from a malicious site, a remote attacker
could create the file with an arbitrary name (e.g. .wgetrc), and possibly run arbitrary code.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/982-1/

Solution

Update the affected wget package.

Risk Factor

Medium

VPR Score

5.2

EPSS Score

0.005

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

CVE CVE-2010-2252
XREF USN:982-1

192.168.1.38 418
Plugin Information

Published: 2010/09/03, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : wget_1.10.2-3ubuntu1


- Fixed package : wget_1.10.2-3ubuntu1.2

192.168.1.38 419
46179 - Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 : postgresql-8.1, postgresql-8.3, postgresql-8.4
vulnerability (USN-933-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL did not properly sanitize its input when using substring() with a SELECT
statement. A remote authenticated attacker could exploit this to cause a denial of service via application
crash.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/933-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.9561

CVSS v2.0 Base Score

6.5 (CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.1 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 37973
CVE CVE-2010-0442

192.168.1.38 420
XREF USN:933-1
XREF CWE:189

Plugin Information

Published: 2010/04/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.10-0ubuntu8.04.1

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.10-0ubuntu8.04.1

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.10-0ubuntu8.04.1

192.168.1.38 421
50823 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : apache2 vulnerabilities (USN-1021-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that Apache's mod_cache and mod_dav modules incorrectly handled requests that lacked
a path. A remote attacker could exploit this with a crafted request and cause a denial of service. This issue
affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-1452)

It was discovered that Apache did not properly handle memory when destroying APR buckets. A remote
attacker could exploit this with crafted requests and cause a denial of service via memory exhaustion.
This issue affected Ubuntu 6.06 LTS and 10.10. (CVE-2010-1623).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1021-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.4253

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

192.168.1.38 422
BID 41963
BID 43673
CVE CVE-2010-1452
CVE CVE-2010-1623
XREF USN:1021-1

Plugin Information

Published: 2010/11/28, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2_2.2.8-1


- Fixed package : apache2_2.2.8-1ubuntu0.19

- Installed package : apache2-mpm-prefork_2.2.8-1ubuntu0.15


- Fixed package : apache2-mpm-prefork_2.2.8-1ubuntu0.19

- Installed package : apache2-utils_2.2.8-1ubuntu0.15


- Fixed package : apache2-utils_2.2.8-1ubuntu0.19

- Installed package : apache2.2-common_2.2.8-1ubuntu0.15


- Fixed package : apache2.2-common_2.2.8-1ubuntu0.19

192.168.1.38 423
50560 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : libxml2 vulnerability (USN-1016-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Bui Quang Minh discovered that libxml2 did not properly process XPath namespaces and attributes. If an
application using libxml2 opened a specially crafted XML file, an attacker could cause a denial of service or
possibly execute code as the user invoking the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1016-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0017

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

References

CVE CVE-2010-4008
XREF USN:1016-1

Plugin Information

Published: 2010/11/11, Modified: 2019/09/19

192.168.1.38 424
Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.5

192.168.1.38 425
50843 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : linux, linux-{ec2,source-2.6.15}
vulnerabilities (USN-1023-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Nelson Elhage discovered several problems with the Acorn Econet protocol driver. A local user could cause
a denial of service via a NULL pointer dereference, escalate privileges by overflowing the kernel stack, and
assign Econet addresses to arbitrary interfaces.
(CVE-2010-3848, CVE-2010-3849, CVE-2010-3850)

Dan Rosenberg discovered that the VIA video driver did not correctly clear kernel memory. A local attacker
could exploit this to read kernel stack memory, leading to a loss of privacy. (CVE-2010-4082).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1023-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

8.9

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.0 (CVSS2#E:H/RL:OF/RC:C)

192.168.1.38 426
References

BID 45072
CVE CVE-2010-3848
CVE CVE-2010-3849
CVE CVE-2010-3850
CVE CVE-2010-4082
XREF USN:1023-1

Plugin Information

Published: 2010/11/30, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-28.81

- Installed package : linux-libc-dev_2.6.24-27.68


- Fixed package : linux-libc-dev_2.6.24-28.81

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 427
50573 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : mysql-5.1, mysql-dfsg-5.0, mysql-
dfsg-5.1 vulnerabilities (USN-1017-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY
NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of
service. This issue only affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-2008)

It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. An
authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only
affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.
(CVE-2010-3677)

It was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An
authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only
affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3678)

It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. An
authenticated user could exploit this to make MySQL crash, causing a denial of service. This issue only
affected Ubuntu 9.10 and 10.04 LTS. (CVE-2010-3679)

It was discovered that MySQL incorrectly handled the use of TEMPORARY InnoDB tables with nullable
columns. An authenticated user could exploit this to make MySQL crash, causing a denial of service. This
issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS.
(CVE-2010-3680)

It was discovered that MySQL incorrectly handled alternate reads from two indexes on a table using the
HANDLER interface. An authenticated user could exploit this to make MySQL crash, causing a denial of
service. This issue only affected Ubuntu 6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3681)

It was discovered that MySQL incorrectly handled use of EXPLAIN with certain queries. An authenticated
user could exploit this to make MySQL crash, causing a denial of service. This issue only affected Ubuntu
6.06 LTS, 8.04 LTS, 9.10 and 10.04 LTS. (CVE-2010-3682)

It was discovered that MySQL incorrectly handled error reporting when using LOAD DATA INFILE and
would incorrectly raise an assert in certain circumstances. An authenticated user could exploit this to
make MySQL crash, causing a denial of service. This issue only affected Ubuntu 9.10 and 10.04 LTS.
(CVE-2010-3683)

It was discovered that MySQL incorrectly handled propagation during evaluation of arguments to extreme-
value functions. An authenticated user could exploit this to make MySQL crash, causing a denial of service.
This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10. (CVE-2010-3833)

It was discovered that MySQL incorrectly handled materializing a derived table that required a temporary
table for grouping. An authenticated user could exploit this to make MySQL crash, causing a denial of
service. (CVE-2010-3834)

It was discovered that MySQL incorrectly handled certain user-variable assignment expressions that
are evaluated in a logical expression context. An authenticated user could exploit this to make MySQL

192.168.1.38 428
crash, causing a denial of service. This issue only affected Ubuntu 8.04 LTS, 9.10, 10.04 LTS and 10.10.
(CVE-2010-3835)

It was discovered that MySQL incorrectly handled pre-evaluation of LIKE predicates during view
preparation. An authenticated user could exploit this to make MySQL crash, causing a denial of service.
(CVE-2010-3836)

It was discovered that MySQL incorrectly handled using GROUP_CONCAT() and WITH ROLLUP together. An
authenticated user could exploit this to make MySQL crash, causing a denial of service. (CVE-2010-3837)

It was discovered that MySQL incorrectly handled certain queries using a mixed list of numeric and
LONGBLOB arguments to the GREATEST() or LEAST() functions. An authenticated user could exploit this to
make MySQL crash, causing a denial of service. (CVE-2010-3838)

It was discovered that MySQL incorrectly handled queries with nested joins when used from stored
procedures and prepared statements. An authenticated user could exploit this to make MySQL hang,
causing a denial of service. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10. (CVE-2010-3839)

It was discovered that MySQL incorrectly handled improper WKB data passed to the PolyFromWKB()
function. An authenticated user could exploit this to make MySQL crash, causing a denial of service.
(CVE-2010-3840).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1017-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.1123

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 429
3.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 41198
BID 42596
BID 42598
BID 42599
BID 42625
BID 42633
BID 42638
BID 42646
BID 43676
CVE CVE-2010-2008
CVE CVE-2010-3677
CVE CVE-2010-3678
CVE CVE-2010-3679
CVE CVE-2010-3680
CVE CVE-2010-3681
CVE CVE-2010-3682
CVE CVE-2010-3683
CVE CVE-2010-3833
CVE CVE-2010-3834
CVE CVE-2010-3835
CVE CVE-2010-3836
CVE CVE-2010-3837
CVE CVE-2010-3838
CVE CVE-2010-3839
CVE CVE-2010-3840
XREF USN:1017-1

Plugin Information

Published: 2010/11/12, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libmysqlclient15off_5.0.51a-3ubuntu5


- Fixed package : libmysqlclient15off_5.0.51a-3ubuntu5.8

- Installed package : mysql-client-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-client-5.0_5.0.51a-3ubuntu5.8

- Installed package : mysql-common_5.0.51a-3ubuntu5


- Fixed package : mysql-common_5.0.51a-3ubuntu5.8

192.168.1.38 430
- Installed package : mysql-server_5.0.51a-3ubuntu5
- Fixed package : mysql-server_5.0.51a-3ubuntu5.8

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.51a-3ubuntu5.8

192.168.1.38 431
51076 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : openssl vulnerabilities (USN-1029-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that an old bug workaround in the SSL/TLS server code allowed an attacker to modify the
stored session cache ciphersuite. This could possibly allow an attacker to downgrade the ciphersuite to a
weaker one on subsequent connections. (CVE-2010-4180)

It was discovered that an old bug workaround in the SSL/TLS server code allowed an attacker to modify
the stored session cache ciphersuite. An attacker could possibly take advantage of this to force the use of
a disabled cipher. This vulnerability only affects the versions of OpenSSL in Ubuntu 6.06 LTS, Ubuntu 8.04
LTS, and Ubuntu 9.10. (CVE-2008-7270).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1029-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.008

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:ND/RL:OF/RC:C)

192.168.1.38 432
References

BID 45164
CVE CVE-2008-7270
CVE CVE-2010-4180
XREF USN:1029-1

Plugin Information

Published: 2010/12/08, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.13

192.168.1.38 433
51525 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : php5 regression (USN-1042-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-1042-1 fixed vulnerabilities in PHP5. The fix for CVE-2010-3436 introduced a regression in the
open_basedir restriction handling code.
This update fixes the problem.

We apologize for the inconvenience.

It was discovered that attackers might be able to bypass open_basedir() restrictions by passing a specially
crafted filename.
(CVE-2010-3436).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1042-2/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0056

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

4.3 (CVSS2#E:ND/RL:OF/RC:C)

192.168.1.38 434
References

BID 44723
CVE CVE-2010-3436
XREF USN:1042-2

Plugin Information

Published: 2011/01/14, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.14

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.14

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.14

- Installed package : php5-gd_5.2.4-2ubuntu5.10


- Fixed package : php5-gd_5.2.4-2ubuntu5.14

- Installed package : php5-mysql_5.2.4-2ubuntu5.10


- Fixed package : php5-mysql_5.2.4-2ubuntu5.14

192.168.1.38 435
51502 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : php5 vulnerabilities (USN-1042-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that an integer overflow in the XML UTF-8 decoding code could allow an attacker to
bypass cross-site scripting (XSS) protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu 8.04 LTS, and
Ubuntu 9.10. (CVE-2009-5016)

It was discovered that the XML UTF-8 decoding code did not properly handle non-shortest form UTF-8
encoding and ill-formed subsequences in UTF-8 data, which could allow an attacker to bypass cross-site
scripting (XSS) protections. (CVE-2010-3870)

It was discovered that attackers might be able to bypass open_basedir() restrictions by passing a specially
crafted filename.
(CVE-2010-3436)

Maksymilian Arciemowicz discovered that a NULL pointer derefence in the ZIP archive handling code could
allow an attacker to cause a denial of service through a specially crafted ZIP archive. This issue only affected
Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. (CVE-2010-3709)

It was discovered that a stack consumption vulnerability in the filter_var() PHP function when in
FILTER_VALIDATE_EMAIL mode, could allow a remote attacker to cause a denial of service. This issue only
affected Ubuntu 8.04 LTS, Ubuntu 9.10, Ubuntu 10.04 LTS, and Ubuntu 10.10. (CVE-2010-3710)

It was discovered that the mb_strcut function in the Libmbfl library within PHP could allow an attacker to
read arbitrary memory within the application process. This issue only affected Ubuntu 10.10.
(CVE-2010-4156)

Maksymilian Arciemowicz discovered that an integer overflow in the NumberFormatter::getSymbol function


could allow an attacker to cause a denial of service. This issue only affected Ubuntu 10.04 LTS and Ubuntu
10.10. (CVE-2010-4409)

Rick Regan discovered that when handing PHP textual representations of the largest subnormal double-
precision floating-point number, the zend_strtod function could go into an infinite loop on 32bit x86
processors, allowing an attacker to cause a denial of service.
(CVE-2010-4645).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1042-1/

Solution

Update the affected packages.

192.168.1.38 436
Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0784

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 43926
BID 44605
BID 44718
BID 44723
BID 44727
BID 44889
BID 45119
BID 45668
CVE CVE-2009-5016
CVE CVE-2010-3436
CVE CVE-2010-3709
CVE CVE-2010-3710
CVE CVE-2010-3870
CVE CVE-2010-4156
CVE CVE-2010-4409
CVE CVE-2010-4645
XREF USN:1042-1

Plugin Information

Published: 2011/01/12, Modified: 2019/09/19

Plugin Output

tcp/0

192.168.1.38 437
- Installed package : php5-cgi_5.2.4-2ubuntu5.10
- Fixed package : php5-cgi_5.2.4-2ubuntu5.13

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.13

- Installed package : php5-common_5.2.4-2ubuntu5.10


- Fixed package : php5-common_5.2.4-2ubuntu5.13

- Installed package : php5-gd_5.2.4-2ubuntu5.10


- Fixed package : php5-gd_5.2.4-2ubuntu5.13

- Installed package : php5-mysql_5.2.4-2ubuntu5.10


- Fixed package : php5-mysql_5.2.4-2ubuntu5.13

192.168.1.38 438
55071 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : postfix vulnerabilities (USN-1113-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that the Postfix package incorrectly granted write access on the PID directory to the
postfix user. A local attacker could use this flaw to possibly conduct a symlink attack and overwrite
arbitrary files. This issue only affected Ubuntu 6.06 LTS and 8.04 LTS. (CVE-2009-2939)

Wietse Venema discovered that Postfix incorrectly handled cleartext commands after TLS is in place. A
remote attacker could exploit this to inject cleartext commands into TLS sessions, and possibly obtain
confidential information such as passwords. (CVE-2011-0411).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1113-1/

Solution

Update the affected postfix package.

Risk Factor

Medium

VPR Score

7.3

EPSS Score

0.0114

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.1 (CVSS2#E:U/RL:OF/RC:C)

References

192.168.1.38 439
BID 36469
BID 46767
CVE CVE-2009-2939
CVE CVE-2011-0411
XREF USN:1113-1
XREF CWE:59

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postfix_2.5.1-2ubuntu1


- Fixed package : postfix_2.5.1-2ubuntu1.3

192.168.1.38 440
51871 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : postgresql-8.1, postgresql-8.3,
postgresql-8.4 vulnerability (USN-1058-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Geoff Keating reported that a buffer overflow exists in the intarray module's input function for the
query_int type. This could allow an attacker to cause a denial of service or possibly execute arbitrary code
as the postgres user.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1058-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.0188

CVSS v2.0 Base Score

6.5 (CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

4.8 (CVSS2#E:U/RL:OF/RC:C)

References

BID 46084
CVE CVE-2010-4015

192.168.1.38 441
XREF USN:1058-1

Plugin Information

Published: 2011/02/04, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpq5_8.3.1-1


- Fixed package : libpq5_8.3.14-0ubuntu8.04

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.14-0ubuntu8.04

- Installed package : postgresql-client-8.3_8.3.1-1


- Fixed package : postgresql-client-8.3_8.3.14-0ubuntu8.04

192.168.1.38 442
52477 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : samba vulnerability (USN-1075-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Volker Lendecke discovered that Samba incorrectly handled certain file descriptors. A remote attacker
could send a specially crafted request to the server and cause Samba to crash or hang, resulting in a denial
of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1075-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0365

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 46597
CVE CVE-2011-0719
XREF USN:1075-1

192.168.1.38 443
Plugin Information

Published: 2011/03/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.14

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.14

192.168.1.38 444
53294 - Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : tiff vulnerability (USN-1102-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Martin Barbella discovered that the thunder (aka ThunderScan) decoder in the TIFF library incorrectly
handled an unexpected BitsPerSample value. If a user or automated system were tricked into opening a
specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash
the application, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1102-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.3304

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 46951
CVE CVE-2011-1167

192.168.1.38 445
XREF USN:1102-1

Plugin Information

Published: 2011/04/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.9

192.168.1.38 446
57999 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : apache2 vulnerabilities (USN-1368-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that the Apache HTTP Server incorrectly handled the SetEnvIf .htaccess file directive. An
attacker having write access to a .htaccess file may exploit this to possibly execute arbitrary code.
(CVE-2011-3607)

Prutha Parikh discovered that the mod_proxy module did not properly interact with the RewriteRule
and ProxyPassMatch pattern matches in the configuration of a reverse proxy. This could allow remote
attackers to contact internal webservers behind the proxy that were not intended for external exposure.
(CVE-2011-4317)

Rainer Canavan discovered that the mod_log_config module incorrectly handled a certain format string
when used with a threaded MPM. A remote attacker could exploit this to cause a denial of service via a
specially- crafted cookie. This issue only affected Ubuntu 11.04 and 11.10. (CVE-2012-0021)

It was discovered that the Apache HTTP Server incorrectly handled certain type fields within a scoreboard
shared memory segment. A local attacker could exploit this to to cause a denial of service.
(CVE-2012-0031)

Norman Hippert discovered that the Apache HTTP Server incorrecly handled header information when
returning a Bad Request (400) error page. A remote attacker could exploit this to obtain the values of
certain HTTPOnly cookies. (CVE-2012-0053).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1368-1/

Solution

Update the affected apache2.2-common package.

Risk Factor

Medium

VPR Score

6.6

EPSS Score

192.168.1.38 447
0.9333

CVSS v2.0 Base Score

4.6 (CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

3.6 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 50494
BID 50802
BID 51407
BID 51705
BID 51706
CVE CVE-2011-3607
CVE CVE-2011-4317
CVE CVE-2012-0021
CVE CVE-2012-0031
CVE CVE-2012-0053
XREF USN:1368-1

Plugin Information

Published: 2012/02/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2.2-common_2.2.8-1ubuntu0.15


- Fixed package : apache2.2-common_2.2.8-1ubuntu0.23

192.168.1.38 448
56778 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : apache2, apache2-mpm-itk
vulnerabilities (USN-1259-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the mod_proxy module in Apache did not properly interact with the RewriteRule
and ProxyPassMatch pattern matches in the configuration of a reverse proxy. This could allow remote
attackers to contact internal webservers behind the proxy that were not intended for external exposure.
(CVE-2011-3368)

Stefano Nichele discovered that the mod_proxy_ajp module in Apache when used with
mod_proxy_balancer in certain configurations could allow remote attackers to cause a denial of service via
a malformed HTTP request. (CVE-2011-3348)

Samuel Montosa discovered that the ITK Multi-Processing Module for Apache did not properly handle
certain configuration sections that specify NiceValue but not AssignUserID, preventing Apache from
dropping privileges correctly. This issue only affected Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04.
(CVE-2011-1176)

USN 1199-1 fixed a vulnerability in the byterange filter of Apache.


The upstream patch introduced a regression in Apache when handling specific byte range requests. This
update fixes the issue.

A flaw was discovered in the byterange filter in Apache. A remote attacker could exploit this to cause a
denial of service via resource exhaustion.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1259-1/

Solution

Update the affected apache2-mpm-itk, apache2.2-bin and / or apache2.2-common packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

192.168.1.38 449
0.9725

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.9 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 46953
BID 49616
BID 49957
CVE CVE-2011-1176
CVE CVE-2011-3348
CVE CVE-2011-3368
XREF USN:1259-1

Plugin Information

Published: 2011/11/11, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2.2-common_2.2.8-1ubuntu0.15


- Fixed package : apache2.2-common_2.2.8-1ubuntu0.22

192.168.1.38 450
57315 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : bzip2 vulnerability (USN-1308-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

vladz discovered that executables compressed by bzexe insecurely create temporary files when they are
ran. A local attacker could exploit this issue to execute arbitrary code as the user running a compressed
executable.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1308-1/

Solution

Update the affected bzip2 package.

Risk Factor

Medium

VPR Score

8.9

EPSS Score

0.0004

CVSS v2.0 Base Score

4.6 (CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

4.0 (CVSS2#E:H/RL:OF/RC:C)

References

BID 50409
CVE CVE-2011-4089
XREF USN:1308-1

192.168.1.38 451
Plugin Information

Published: 2011/12/15, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : bzip2_1.0.4-2ubuntu4


- Fixed package : bzip2_1.0.4-2ubuntu4.2

192.168.1.38 452
58618 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : gnutls13, gnutls26 vulnerabilities
(USN-1418-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Alban Crequy discovered that the GnuTLS library incorrectly checked array bounds when copying TLS
session data. A remote attacker could crash a client application, leading to a denial of service, as the client
application prepared for TLS session resumption.
(CVE-2011-4128)

Matthew Hall discovered that the GnuTLS library incorrectly handled TLS records. A remote attacker
could crash client and server applications, leading to a denial of service, by sending a crafted TLS record.
(CVE-2012-1573).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1418-1/

Solution

Update the affected libgnutls13 and / or libgnutls26 packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.9441

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 453
References

BID 50609
BID 52667
CVE CVE-2011-4128
CVE CVE-2012-1573
XREF USN:1418-1

Plugin Information

Published: 2012/04/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libgnutls13_2.0.4-1ubuntu2


- Fixed package : libgnutls13_2.0.4-1ubuntu2.7

192.168.1.38 454
58443 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libpng vulnerability (USN-1402-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libpng did not properly process compressed chunks. If a user or automated system
using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a
denial of service or execute code with the privileges of the user invoking the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1402-1/

Solution

Update the affected libpng12-0 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.1854

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52453
CVE CVE-2011-3045
XREF USN:1402-1

192.168.1.38 455
Plugin Information

Published: 2012/03/23, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpng12-0_1.2.15~beta5-3ubuntu0.2


- Fixed package : libpng12-0_1.2.15~beta5-3ubuntu0.6

192.168.1.38 456
58617 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libpng vulnerability (USN-1417-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libpng incorrectly handled certain memory operations. If a user or automated
system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or execute code with the privileges of the user invoking the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1417-1/

Solution

Update the affected libpng12-0 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0604

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52830
CVE CVE-2011-3048
XREF USN:1417-1

192.168.1.38 457
Plugin Information

Published: 2012/04/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpng12-0_1.2.15~beta5-3ubuntu0.2


- Fixed package : libpng12-0_1.2.15~beta5-3ubuntu0.7

192.168.1.38 458
58145 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : libxml2 vulnerability (USN-1376-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Juraj Somorovsky discovered that libxml2 was vulnerable to hash table collisions. If a user or application
linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause a
denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1376-1/

Solution

Update the affected libxml2 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0091

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52107
CVE CVE-2012-0841
XREF USN:1376-1

192.168.1.38 459
Plugin Information

Published: 2012/02/28, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.8

192.168.1.38 460
56629 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : pam vulnerabilities (USN-1237-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Kees Cook discovered that the PAM pam_env module incorrectly handled certain malformed environment
files. A local attacker could use this flaw to cause a denial of service, or possibly gain privileges. The
default compiler options for affected releases should reduce the vulnerability to a denial of service.
(CVE-2011-3148)

Kees Cook discovered that the PAM pam_env module incorrectly handled variable expansion. A local
attacker could use this flaw to cause a denial of service. (CVE-2011-3149)

Stephane Chazelas discovered that the PAM pam_motd module incorrectly cleaned the environment during
execution of the motd scripts. In certain environments, a local attacker could use this to execute arbitrary
code as root, and gain privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1237-1/

Solution

Update the affected libpam-modules package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

192.168.1.38 461
5.1 (CVSS2#E:U/RL:OF/RC:C)

References

CVE CVE-2011-3148
CVE CVE-2011-3149
CVE CVE-2011-3628
XREF USN:1237-1

Plugin Information

Published: 2011/10/25, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpam-modules_0.99.7.1-5ubuntu6


- Fixed package : libpam-modules_0.99.7.1-5ubuntu6.5

192.168.1.38 462
57314 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : php5 vulnerability (USN-1307-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Florent Hochwelker discovered that PHP incorrectly handled certain EXIF headers in JPEG files. A remote
attacker could exploit this issue to view sensitive information or cause the PHP server to crash.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1307-1/

Solution

Update the affected php5-cgi and / or php5-cli packages.

Risk Factor

Medium

VPR Score

6.0

EPSS Score

0.8817

CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 50907
CVE CVE-2011-4566
XREF USN:1307-1

192.168.1.38 463
Plugin Information

Published: 2011/12/15, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : php5-cgi_5.2.4-2ubuntu5.10


- Fixed package : php5-cgi_5.2.4-2ubuntu5.19

- Installed package : php5-cli_5.2.4-2ubuntu5.10


- Fixed package : php5-cli_5.2.4-2ubuntu5.19

192.168.1.38 464
58168 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : postgresql-8.3, postgresql-8.4,
postgresql-9.1 vulnerabilities (USN-1378-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL incorrectly checked permissions on functions called by a trigger. An
attacker could attach a trigger to a table they owned and possibly escalate privileges. (CVE-2012-0866)

It was discovered that PostgreSQL incorrectly truncated SSL certificate name checks to 32 characters.
If a host name was exactly 32 characters, this issue could be exploited by an attacker to spoof the
SSL certificate. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10.
(CVE-2012-0867)

It was discovered that the PostgreSQL pg_dump utility incorrectly filtered line breaks in object names. An
attacker could create object names that execute arbitrary SQL commands when a dump script is reloaded.
(CVE-2012-0868).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1378-1/

Solution

Update the affected postgresql-8.3, postgresql-8.4 and / or postgresql-9.1 packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0094

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 465
5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52188
CVE CVE-2012-0866
CVE CVE-2012-0867
CVE CVE-2012-0868
XREF USN:1378-1

Plugin Information

Published: 2012/02/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.18-0ubuntu0.8.04

192.168.1.38 466
58600 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : tiff vulnerabilities (USN-1416-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Alexander Gavrun discovered that the TIFF library incorrectly allocated space for a tile. If a user or
automated system were tricked into opening a specially crafted TIFF image, a remote attacker could
execute arbitrary code with user privileges, or crash the application, leading to a denial of service.
(CVE-2012-1173)

It was discovered that the tiffdump utility incorrectly handled directory data structures with many directory
entries. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote
attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with
user privileges. This issue only applied to Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu
11.04. (CVE-2010-4665).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1416-1/

Solution

Update the affected libtiff4 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0922

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 467
References

BID 47338
CVE CVE-2010-4665
CVE CVE-2012-1173
XREF USN:1416-1

Plugin Information

Published: 2012/04/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.10

192.168.1.38 468
57997 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : update-manager regression
(USN-1284-2)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

USN-1284-1 fixed vulnerabilities in Update Manager. One of the fixes introduced a regression for Kubuntu
users attempting to upgrade to a newer Ubuntu release. This update fixes the problem.

We apologize for the inconvenience.

David Black discovered that Update Manager incorrectly extracted the downloaded upgrade tarball before
verifying its GPG signature. If a remote attacker were able to perform a man-in-the-middle attack, this flaw
could potentially be used to replace arbitrary files.
(CVE-2011-3152)

David Black discovered that Update Manager created a temporary directory in an insecure fashion. A local
attacker could possibly use this flaw to read the XAUTHORITY file of the user performing the upgrade.
(CVE-2011-3154)

This update also adds a hotfix to Update Notifier to handle cases where the upgrade is being performed
from CD media.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1284-2/

Solution

Update the affected update-manager-core package.

Risk Factor

Medium

VPR Score

4.2

EPSS Score

0.0014

192.168.1.38 469
CVSS v2.0 Base Score

6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)

References

CVE CVE-2011-3152
CVE CVE-2011-3154
XREF USN:1284-2

Plugin Information

Published: 2012/02/17, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : update-manager-core_1:0.87.24


- Fixed package : update-manager-core_1:0.87.33

192.168.1.38 470
55699 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : libpng vulnerabilities (USN-1175-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Frank Busse discovered that libpng did not properly handle certain malformed PNG images. If a user or
automated system were tricked into opening a crafted PNG file, an attacker could cause libpng to crash,
resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS, 10.10, and 11.04. (CVE-2011-2501)

It was discovered that libpng did not properly handle certain malformed PNG images. If a user or
automated system were tricked into opening a crafted PNG file, an attacker could cause a denial of service
or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-2690)

Frank Busse discovered that libpng did not properly handle certain PNG images with invalid sCAL chunks.
If a user or automated system were tricked into opening a crafted PNG file, an attacker could cause a
denial of service or possibly execute arbitrary code with the privileges of the user invoking the program.
(CVE-2011-2692).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1175-1/

Solution

Update the affected libpng12-0 package.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0205

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 471
5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 48474
BID 48618
BID 48660
CVE CVE-2011-2501
CVE CVE-2011-2690
CVE CVE-2011-2692
XREF USN:1175-1

Plugin Information

Published: 2011/07/27, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpng12-0_1.2.15~beta5-3ubuntu0.2


- Fixed package : libpng12-0_1.2.15~beta5-3ubuntu0.4

192.168.1.38 472
55648 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : logrotate vulnerabilities (USN-1172-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that logrotate incorrectly handled the creation of new log files. Local users could possibly
read log files if they were opened before permissions were in place. This issue only affected Ubuntu 8.04
LTS. (CVE-2011-1098)

It was discovered that logrotate incorrectly handled certain log file names when used with the shred
option. Local attackers able to create log files with specially crafted filenames could use this issue to
execute arbitrary code. This issue only affected Ubuntu 10.04 LTS, 10.10, and 11.04. (CVE-2011-1154)

It was discovered that logrotate incorrectly handled certain malformed log filenames. Local attackers able
to create log files with specially crafted filenames could use this issue to cause logrotate to stop processing
log files, resulting in a denial of service.
(CVE-2011-1155)

It was discovered that logrotate incorrectly handled symlinks and hard links when processing log files. A
local attacker having write access to a log file directory could use this issue to overwrite or read arbitrary
files. This issue only affected Ubuntu 8.04 LTS.
(CVE-2011-1548).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1172-1/

Solution

Update the affected logrotate package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0007

192.168.1.38 473
CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.7 (CVSS2#E:F/RL:OF/RC:ND)

References

BID 47103
BID 47107
BID 47108
BID 47167
CVE CVE-2011-1098
CVE CVE-2011-1154
CVE CVE-2011-1155
CVE CVE-2011-1548
XREF USN:1172-1

Plugin Information

Published: 2011/07/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : logrotate_3.7.1-3


- Fixed package : logrotate_3.7.1-3ubuntu0.8.04.1

192.168.1.38 474
55103 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : pam regression (USN-1140-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-1140-1 fixed vulnerabilities in PAM. A regression was found that caused cron to stop working with a
'Module is unknown' error. As a result, systems configured with automatic updates will not receive updates
until cron is restarted, these updates are installed or the system is rebooted. This update fixes the problem.

We apologize for the inconvenience.

Marcus Granado discovered that PAM incorrectly handled configuration files with non-ASCII usernames.
A remote attacker could use this flaw to cause a denial of service, or possibly obtain login access with a
different users username. This issue only affected Ubuntu 8.04 LTS.
(CVE-2009-0887)

It was discovered that the PAM pam_xauth, pam_env and pam_mail modules incorrectly handled dropping
privileges when performing operations. A local attacker could use this flaw to read certain arbitrary files,
and access other sensitive information. (CVE-2010-3316, CVE-2010-3430, CVE-2010-3431, CVE-2010-3435)

It was discovered that the PAM pam_namespace module incorrectly cleaned the environment during
execution of the namespace.init script. A local attacker could use this flaw to possibly gain privileges.
(CVE-2010-3853)

It was discovered that the PAM pam_xauth module incorrectly handled certain failures. A local attacker
could use this flaw to delete certain unintended files. (CVE-2010-4706)

It was discovered that the PAM pam_xauth module incorrectly verified certain file properties. A local
attacker could use this flaw to cause a denial of service. (CVE-2010-4707).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1140-2/

Solution

Update the affected libpam-modules and / or libpam0g packages.

Risk Factor

Medium

VPR Score

6.7

192.168.1.38 475
EPSS Score

0.0042

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

References

CVE CVE-2009-0887
CVE CVE-2010-3316
CVE CVE-2010-3430
CVE CVE-2010-3431
CVE CVE-2010-3435
CVE CVE-2010-3853
CVE CVE-2010-4706
CVE CVE-2010-4707
XREF USN:1140-2
XREF CWE:189

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpam-modules_0.99.7.1-5ubuntu6


- Fixed package : libpam-modules_0.99.7.1-5ubuntu6.4

- Installed package : libpam0g_0.99.7.1-5ubuntu6.1


- Fixed package : libpam0g_0.99.7.1-5ubuntu6.4

192.168.1.38 476
55102 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : pam vulnerabilities (USN-1140-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Marcus Granado discovered that PAM incorrectly handled configuration files with non-ASCII usernames.
A remote attacker could use this flaw to cause a denial of service, or possibly obtain login access with a
different users username. This issue only affected Ubuntu 8.04 LTS.
(CVE-2009-0887)

It was discovered that the PAM pam_xauth, pam_env and pam_mail modules incorrectly handled dropping
privileges when performing operations. A local attacker could use this flaw to read certain arbitrary files,
and access other sensitive information. (CVE-2010-3316, CVE-2010-3430, CVE-2010-3431, CVE-2010-3435)

It was discovered that the PAM pam_namespace module incorrectly cleaned the environment during
execution of the namespace.init script.
A local attacker could use this flaw to possibly gain privileges.
(CVE-2010-3853)

It was discovered that the PAM pam_xauth module incorrectly handled certain failures. A local attacker
could use this flaw to delete certain unintended files. (CVE-2010-4706)

It was discovered that the PAM pam_xauth module incorrectly verified certain file properties. A local
attacker could use this flaw to cause a denial of service. (CVE-2010-4707).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1140-1/

Solution

Update the affected libpam-modules package.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0042

192.168.1.38 477
CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.1 (CVSS2#E:U/RL:OF/RC:C)

References

BID 34010
BID 42472
BID 43487
BID 44590
BID 46045
CVE CVE-2009-0887
CVE CVE-2010-3316
CVE CVE-2010-3430
CVE CVE-2010-3431
CVE CVE-2010-3435
CVE CVE-2010-3853
CVE CVE-2010-4706
CVE CVE-2010-4707
XREF USN:1140-1
XREF CWE:189

Plugin Information

Published: 2011/06/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libpam-modules_0.99.7.1-5ubuntu6


- Fixed package : libpam-modules_0.99.7.1-5ubuntu6.3

192.168.1.38 478
56506 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : postgresql-8.3, postgresql-8.4 vulnerability
(USN-1229-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the blowfish algorithm in the pgcrypto module incorrectly handled certain 8-bit
characters, resulting in the password hashes being easier to crack than expected. An attacker who could
obtain the password hashes would be able to recover the plaintext with less effort.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1229-1/

Solution

Update the affected postgresql-8.3 and / or postgresql-8.4 packages.

Risk Factor

Medium

VPR Score

7.3

EPSS Score

0.0033

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 49241
CVE CVE-2011-2483

192.168.1.38 479
XREF USN:1229-1

Plugin Information

Published: 2011/10/14, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.16-0ubuntu0.8.04

192.168.1.38 480
62434 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : dbus regressions (USN-1576-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-1576-1 fixed vulnerabilities in DBus. The update caused a regression for certain services launched
from the activation helper, and caused an unclean shutdown on upgrade. This update fixes the problem.

We apologize for the inconvenience.

Sebastian Krahmer discovered that DBus incorrectly handled environment variables when running with
elevated privileges. A local attacker could possibly exploit this flaw with a setuid binary and gain root
privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1576-2/

Solution

Update the affected dbus and / or libdbus-1-3 packages.

Risk Factor

Medium

VPR Score

9.5

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.4 (CVSS2#E:POC/RL:OF/RC:C)

192.168.1.38 481
References

BID 55517
CVE CVE-2012-3524
XREF USN:1576-2

Exploitable With

Core Impact (true)

Plugin Information

Published: 2012/10/05, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libdbus-1-3_1.1.20-1ubuntu1


- Fixed package : libdbus-1-3_1.1.20-1ubuntu3.9

192.168.1.38 482
62219 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : dbus vulnerability (USN-1576-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Sebastian Krahmer discovered that DBus incorrectly handled environment variables when running with
elevated privileges. A local attacker could possibly exploit this flaw with a setuid binary and gain root
privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1576-1/

Solution

Update the affected dbus and / or libdbus-1-3 packages.

Risk Factor

Medium

VPR Score

9.5

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

6.0 (CVSS2#E:H/RL:OF/RC:C)

References

BID 55517
CVE CVE-2012-3524
XREF USN:1576-1

192.168.1.38 483
Exploitable With

Core Impact (true)

Plugin Information

Published: 2012/09/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libdbus-1-3_1.1.20-1ubuntu1


- Fixed package : libdbus-1-3_1.1.20-1ubuntu3.7

192.168.1.38 484
62388 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : eglibc, glibc vulnerabilities
(USN-1589-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that positional arguments to the printf() family of functions were not handled properly
in the GNU C Library. An attacker could possibly use this to cause a stack-based buffer overflow, creating a
denial of service or possibly execute arbitrary code.
(CVE-2012-3404, CVE-2012-3405, CVE-2012-3406)

It was discovered that multiple integer overflows existed in the strtod(), strtof() and strtold() functions in the
GNU C Library. An attacker could possibly use this to trigger a stack-based buffer overflow, creating a denial
of service or possibly execute arbitrary code. (CVE-2012-3480).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1589-1/

Solution

Update the affected libc6 package.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0156

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.3 (CVSS2#E:POC/RL:OF/RC:C)

192.168.1.38 485
References

BID 54374
BID 54982
CVE CVE-2012-3404
CVE CVE-2012-3405
CVE CVE-2012-3406
CVE CVE-2012-3480
XREF USN:1589-1

Plugin Information

Published: 2012/10/02, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libc6_2.7-10ubuntu5


- Fixed package : libc6_2.7-10ubuntu8.2

192.168.1.38 486
61485 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : expat vulnerabilities (USN-1527-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that Expat computed hash values without restricting the ability to trigger hash collisions
predictably. If a user or application linked against Expat were tricked into opening a crafted XML file, an
attacker could cause a denial of service by consuming excessive CPU resources. (CVE-2012-0876)

Tim Boddy discovered that Expat did not properly handle memory reallocation when processing XML files.
If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could
cause a denial of service by consuming excessive memory resources. This issue only affected Ubuntu 8.04
LTS, 10.04 LTS, 11.04 and 11.10. (CVE-2012-1148).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1527-1/

Solution

Update the affected lib64expat1, libexpat1 and / or libexpat1-udeb packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0091

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 487
References

BID 52379
CVE CVE-2012-0876
CVE CVE-2012-1148
XREF USN:1527-1

Plugin Information

Published: 2012/08/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libexpat1_2.0.1-0ubuntu1


- Fixed package : libexpat1_2.0.1-0ubuntu1.2

192.168.1.38 488
61706 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : libgc vulnerability (USN-1546-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that multiple integer overflows existed in the malloc and calloc implementations in the
Boehm-Demers-Weiser garbage collecting memory allocator (libgc). These could allow an attacker to cause
a denial of service or possibly execute arbitrary code.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1546-1/

Solution

Update the affected libgc1c2 package.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0072

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

4.3 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 54227
CVE CVE-2012-2673
XREF USN:1546-1

192.168.1.38 489
Plugin Information

Published: 2012/08/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libgc1c2_1:6.8-1.1


- Fixed package : libgc1c2_1:6.8-1.1ubuntu0.1

192.168.1.38 490
58974 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : libtasn1-3 vulnerability
(USN-1436-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Matthew Hall discovered that Libtasn incorrectly handled certain large values. An attacker could exploit this
with a specially crafted ASN.1 structure and cause a denial of service, or possibly execute arbitrary code.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1436-1/

Solution

Update the affected libtasn1-3 package.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.8993

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 52668
CVE CVE-2012-1569
XREF USN:1436-1

192.168.1.38 491
Plugin Information

Published: 2012/05/03, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtasn1-3_1.1-1


- Fixed package : libtasn1-3_1.1-1ubuntu0.1

192.168.1.38 492
59225 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : libxml2 vulnerability (USN-1447-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Juri Aedla discovered that libxml2 contained an off by one error in its XPointer functionality. If a user or
application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could
cause the application to crash or possibly execute arbitrary code with the privileges of the user invoking the
program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1447-1/

Solution

Update the affected libxml2 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0456

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 53540
CVE CVE-2011-3102

192.168.1.38 493
XREF USN:1447-1

Plugin Information

Published: 2012/05/22, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.9

192.168.1.38 494
62366 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : libxml2 vulnerability (USN-1587-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Juri Aedla discovered that libxml2 incorrectly handled certain memory operations. If a user or application
linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause the
application to crash or possibly execute arbitrary code with the privileges of the user invoking the program.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1587-1/

Solution

Update the affected libxml2 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0433

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 54718
CVE CVE-2012-2807
XREF USN:1587-1

192.168.1.38 495
Plugin Information

Published: 2012/09/28, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.10

192.168.1.38 496
59452 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : mysql-5.1, mysql-5.5, mysql-
dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1467-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that certain builds of MySQL incorrectly handled password authentication on certain
platforms. A remote attacker could use this issue to authenticate with an arbitrary password and establish
a connection. (CVE-2012-2122)

MySQL has been updated to 5.5.24 in Ubuntu 12.04 LTS. Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu
11.10 have been updated to MySQL 5.1.63.
A patch to fix the issue was backported to the version of MySQL in Ubuntu 8.04 LTS.

In addition to additional security fixes, the updated packages contain bug fixes, new features, and possibly
incompatible changes.

Please see the following for more information :

http://dev.mysql.com/doc/refman/5.5/en/news-5-5-24.html http://dev.mysql.com/doc/refman/5.1/en/
news-5-1-63.html

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1467-1/

Solution

Update the affected mysql-server-5.0, mysql-server-5.1 and / or mysql-server-5.5 packages.

Risk Factor

Medium

VPR Score

4.9

EPSS Score

0.9679

CVSS v2.0 Base Score

192.168.1.38 497
5.1 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

4.2 (CVSS2#E:F/RL:OF/RC:C)

References

BID 53911
CVE CVE-2012-2122
XREF USN:1467-1

Exploitable With

CANVAS (true)

Plugin Information

Published: 2012/06/12, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.96-0ubuntu3

192.168.1.38 498
59289 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl vulnerabilities
(USN-1451-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Ivan Nestlerode discovered that the Cryptographic Message Syntax (CMS) and PKCS #7 implementations
in OpenSSL returned early if RSA decryption failed. This could allow an attacker to expose sensitive
information via a Million Message Attack (MMA). (CVE-2012-0884)

It was discovered that an integer underflow was possible when using TLS 1.1, TLS 1.2, or DTLS with CBC
encryption. This could allow a remote attacker to cause a denial of service. (CVE-2012-2333).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1451-1/

Solution

Update the affected libssl0.9.8, libssl1.0.0 and / or openssl packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0475

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

192.168.1.38 499
BID 52428
BID 53476
CVE CVE-2012-0884
CVE CVE-2012-2333
XREF USN:1451-1

Plugin Information

Published: 2012/05/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libssl0.9.8_0.9.8g-4ubuntu3.18


- Fixed package : libssl0.9.8_0.9.8g-4ubuntu3.19

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.19

192.168.1.38 500
59385 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : postgresql-8.3, postgresql-8.4,
postgresql-9.1 vulnerabilities (USN-1461-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that PostgreSQL incorrectly handled certain bytes passed to the crypt() function when
using DES encryption. An attacker could use this flaw to incorrectly handle authentication.
(CVE-2012-2143)

It was discovered that PostgreSQL incorrectly handled SECURITY DEFINER and SET attributes on procedural
call handlers. An attacker could use this flaw to cause PostgreSQL to crash, leading to a denial of service.
(CVE-2012-2655).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1461-1/

Solution

Update the affected postgresql-8.3, postgresql-8.4 and / or postgresql-9.1 packages.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.012

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 501
References

BID 53729
CVE CVE-2012-2143
CVE CVE-2012-2655
XREF USN:1461-1

Plugin Information

Published: 2012/06/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.19-0ubuntu8.04

192.168.1.38 502
61607 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : postgresql-8.3, postgresql-8.4,
postgresql-9.1 vulnerabilities (USN-1542-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Peter Eisentraut discovered that the XSLT functionality in the optional XML2 extension would allow
unprivileged database users to both read and write data with the privileges of the database server.
(CVE-2012-3488)

Noah Misch and Tom Lane discovered that the XML functionality in the optional XML2 extension would
allow unprivileged database users to read data with the privileges of the database server. (CVE-2012-3489).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1542-1/

Solution

Update the affected postgresql-8.3, postgresql-8.4 and / or postgresql-9.1 packages.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.0022

CVSS v2.0 Base Score

4.9 (CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:N)

CVSS v2.0 Temporal Score

3.6 (CVSS2#E:U/RL:OF/RC:C)

References

192.168.1.38 503
BID 55072
BID 55074
CVE CVE-2012-3488
CVE CVE-2012-3489
XREF USN:1542-1

Plugin Information

Published: 2012/08/21, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.20-0ubuntu8.04

192.168.1.38 504
58872 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1
vulnerabilities (USN-1427-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions
to fix these issues.

MySQL has been updated to 5.1.62 in Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS
has been updated to MySQL 5.0.96.

In addition to security fixes, the updated packages contain bug fixes, new features, and possibly
incompatible changes.

Please see the following for more information :

http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html http://dev.mysql.com/doc/refman/5.0/en/
news-5-0-96.html

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1427-1/

Solution

Update the affected mysql-server-5.0 and / or mysql-server-5.1 packages.

Risk Factor

Medium

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 53058
BID 53067

192.168.1.38 505
BID 53074
XREF USN:1427-1

Plugin Information

Published: 2012/04/25, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : mysql-server-5.0_5.0.51a-3ubuntu5


- Fixed package : mysql-server-5.0_5.0.96-0ubuntu1

192.168.1.38 506
65607 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : apache2 vulnerabilities
(USN-1765-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Niels Heinen discovered that multiple modules incorrectly sanitized certain strings, which could result in
browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site
scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a
remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords),
within the same domain.
(CVE-2012-3499, CVE-2012-4558)

It was discovered that the mod_proxy_ajp module incorrectly handled error states. A remote attacker could
use this issue to cause the server to stop responding, resulting in a denial of service. This issue only applied
to Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and Ubuntu 11.10. (CVE-2012-4557)

It was discovered that the apache2ctl script shipped in Ubuntu packages incorrectly created the lock
directory. A local attacker could possibly use this issue to gain privileges. The symlink protections in Ubuntu
11.10 and later should reduce this vulnerability to a denial of service. (CVE-2013-1048).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1765-1/

Solution

Update the affected apache2.2-common package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.2178

CVSS v2.0 Base Score

192.168.1.38 507
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

CVE CVE-2012-3499
CVE CVE-2012-4557
CVE CVE-2012-4558
CVE CVE-2013-1048
XREF USN:1765-1

Plugin Information

Published: 2013/03/19, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2.2-common_2.2.8-1ubuntu0.15


- Fixed package : apache2.2-common_2.2.8-1ubuntu0.25

192.168.1.38 508
65981 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : curl vulnerability (USN-1801-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

YAMADA Yasuharu discovered that libcurl was vulnerable to a cookie leak when doing requests across
domains with matching tails. curl did not properly restrict cookies to domains and subdomains. If a user
or automated system were tricked into processing a specially crafted URL, an attacker could read cookie
values stored by unrelated webservers.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1801-1/

Solution

Update the affected curl and / or libcurl3 packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0076

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 59058
CVE CVE-2013-1944

192.168.1.38 509
XREF USN:1801-1

Plugin Information

Published: 2013/04/16, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : curl_7.18.0-1ubuntu2.3


- Fixed package : curl_7.18.0-1ubuntu2.4

- Installed package : libcurl3_7.18.0-1ubuntu2.3


- Fixed package : libcurl3_7.18.0-1ubuntu2.4

192.168.1.38 510
63536 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : freetype vulnerabilities
(USN-1686-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a
user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or
possibly execute arbitrary code with user privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1686-1/

Solution

Update the affected libfreetype6 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0179

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

References

BID 57041
CVE CVE-2012-5668

192.168.1.38 511
CVE CVE-2012-5669
CVE CVE-2012-5670
XREF USN:1686-1

Plugin Information

Published: 2013/01/15, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libfreetype6_2.3.5-1ubuntu4.8.04.2


- Fixed package : libfreetype6_2.3.5-1ubuntu4.8.04.10

192.168.1.38 512
63467 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : gnupg, gnupg2 vulnerability
(USN-1682-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

KB Sriram discovered that GnuPG incorrectly handled certain malformed keys. If a user or automated
system were tricked into importing a malformed key, the GnuPG keyring could become corrupted.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1682-1/

Solution

Update the affected gnupg and / or gnupg2 packages.

Risk Factor

Medium

VPR Score

6.0

EPSS Score

0.0482

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 57102
CVE CVE-2012-6085
XREF USN:1682-1

192.168.1.38 513
Plugin Information

Published: 2013/01/10, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : gnupg_1.4.6-2ubuntu5


- Fixed package : gnupg_1.4.6-2ubuntu5.2

192.168.1.38 514
64928 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : gnutls13, gnutls26 vulnerability
(USN-1752-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Nadhem Alfardan and Kenny Paterson discovered that the TLS protocol as used in GnuTLS was vulnerable
to a timing side-channel attack known as the 'Lucky Thirteen' issue. A remote attacker could use this issue
to perform plaintext-recovery attacks via analysis of timing data.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1752-1/

Solution

Update the affected libgnutls13 and / or libgnutls26 packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0045

CVSS v2.0 Base Score

4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)

CVSS v2.0 Temporal Score

3.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 57736
CVE CVE-2013-1619

192.168.1.38 515
XREF USN:1752-1

Plugin Information

Published: 2013/02/28, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libgnutls13_2.0.4-1ubuntu2


- Fixed package : libgnutls13_2.0.4-1ubuntu2.9

192.168.1.38 516
63165 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : libxml2 vulnerability (USN-1656-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libxml2 had a heap-based buffer underflow when parsing entities. If a user or
automated system were tricked into processing a specially crafted XML document, applications linked
against libxml2 could be made to crash or possibly execute arbitrary code.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1656-1/

Solution

Update the affected libxml2 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0449

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 56684
CVE CVE-2012-5134
XREF USN:1656-1

192.168.1.38 517
Plugin Information

Published: 2012/12/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.11

192.168.1.38 518
65730 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : libxml2 vulnerability (USN-1782-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that libxml2 incorrectly handled XML entity expansion. An attacker could use this flaw to
cause libxml2 to consume large amounts of resources, resulting in a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1782-1/

Solution

Update the affected libxml2 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0126

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.2 (CVSS2#E:U/RL:OF/RC:C)

References

BID 58180
CVE CVE-2013-0338
XREF USN:1782-1

192.168.1.38 519
Plugin Information

Published: 2013/03/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libxml2_2.6.31.dfsg-2ubuntu1


- Fixed package : libxml2_2.6.31.dfsg-2ubuntu1.12

192.168.1.38 520
64798 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : openssl vulnerabilities
(USN-1732-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Adam Langley and Wolfgang Ettlingers discovered that OpenSSL incorrectly handled certain crafted CBC
data when used with AES-NI. A remote attacker could use this issue to cause OpenSSL to crash, resulting in
a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 12.10. (CVE-2012-2686)

Stephen Henson discovered that OpenSSL incorrectly performed signature verification for OCSP responses.
A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service.
(CVE-2013-0166)

Nadhem Alfardan and Kenny Paterson discovered that the TLS protocol as used in OpenSSL was vulnerable
to a timing side-channel attack known as the 'Lucky Thirteen' issue. A remote attacker could use this issue
to perform plaintext-recovery attacks via analysis of timing data.
(CVE-2013-0169).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1732-1/

Solution

Update the affected libssl0.9.8 and / or libssl1.0.0 packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.1833

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

192.168.1.38 521
CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 57755
BID 57778
CVE CVE-2012-2686
CVE CVE-2013-0166
CVE CVE-2013-0169
XREF USN:1732-1
XREF CEA-ID:CEA-2019-0547

Plugin Information

Published: 2013/02/22, Modified: 2022/12/05

Plugin Output

tcp/0

- Installed package : libssl0.9.8_0.9.8g-4ubuntu3.18


- Fixed package : libssl0.9.8_0.9.8g-4ubuntu3.20

192.168.1.38 522
64616 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : postgresql-8.3, postgresql-8.4,
postgresql-9.1 vulnerability (USN-1717-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Sumit Soni discovered that PostgreSQL incorrectly handled calling a certain internal function with invalid
arguments. An authenticated attacker could use this issue to cause PostgreSQL to crash, resulting in a
denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1717-1/

Solution

Update the affected postgresql-8.3, postgresql-8.4 and / or postgresql-9.1 packages.

Risk Factor

Medium

VPR Score

1.4

EPSS Score

0.0164

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 57844
CVE CVE-2013-0255

192.168.1.38 523
XREF USN:1717-1

Plugin Information

Published: 2013/02/13, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : postgresql-8.3_8.3.1-1


- Fixed package : postgresql-8.3_8.3.23-0ubuntu8.04

192.168.1.38 524
64969 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : sudo vulnerability (USN-1754-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Marco Schoepl discovered that Sudo incorrectly handled time stamp files when the system clock is set to
epoch. A local attacker could use this issue to run Sudo commands without a password prompt.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1754-1/

Solution

Update the affected sudo and / or sudo-ldap packages.

Risk Factor

Medium

VPR Score

8.9

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.7 (CVSS2#E:F/RL:OF/RC:C)

References

BID 58203
CVE CVE-2013-1775
XREF USN:1754-1

192.168.1.38 525
Exploitable With

CANVAS (true) Metasploit (true)

Plugin Information

Published: 2013/03/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : sudo_1.6.9p10-1ubuntu3


- Fixed package : sudo_1.6.9p10-1ubuntu3.10

192.168.1.38 526
62936 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : tiff vulnerabilities (USN-1631-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that LibTIFF incorrectly handled certain malformed images using the PixarLog
compression format. If a user or automated system were tricked into opening a specially crafted TIFF
image, a remote attacker could crash the application, leading to a denial of service, or possibly execute
arbitrary code with user privileges.
(CVE-2012-4447)

Huzaifa S. Sidhpurwala discovered that the ppm2tiff tool incorrectly handled certain malformed PPM
images. If a user or automated system were tricked into opening a specially crafted PPM image, a remote
attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with
user privileges.
(CVE-2012-4564).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1631-1/

Solution

Update the affected libtiff4 and / or libtiff5 packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0372

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

192.168.1.38 527
5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 55673
BID 56372
CVE CVE-2012-4447
CVE CVE-2012-4564
XREF USN:1631-1

Plugin Information

Published: 2012/11/16, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.14

192.168.1.38 528
63164 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS : tiff vulnerability (USN-1655-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that LibTIFF incorrectly handled certain malformed images using the DOTRANGE tag. If a
user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could
crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1655-1/

Solution

Update the affected libtiff4 package.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0372

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS v2.0 Temporal Score

5.0 (CVSS2#E:U/RL:OF/RC:C)

References

BID 56715
CVE CVE-2012-5581
XREF USN:1655-1

192.168.1.38 529
Plugin Information

Published: 2012/12/06, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libtiff4_3.8.2-7ubuntu3.4


- Fixed package : libtiff4_3.8.2-7ubuntu3.16

192.168.1.38 530
36749 - Ubuntu 8.04 LTS / 8.10 : dash vulnerability (USN-732-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Wolfgang M. Reimer discovered that dash, when invoked as a login shell, would source .profile files from
the current directory. Local users may be able to bypass security restrictions and gain root privileges by
placing specially crafted .profile files where they might get sourced by other dash users.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/732-1/

Solution

Update the affected ash and / or dash packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.0004

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

References

CVE CVE-2009-0854
XREF USN:732-1
XREF CWE:78

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

192.168.1.38 531
Plugin Output

tcp/0

- Installed package : dash_0.5.4-8ubuntu1


- Fixed package : dash_0.5.4-8ubuntu1.1

192.168.1.38 532
38070 - Ubuntu 8.04 LTS / 8.10 : sudo vulnerability (USN-722-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Harald Koenig discovered that sudo did not correctly handle certain privilege changes when handling
groups. If a local attacker belonged to a group included in a 'RunAs' list in the /etc/sudoers file, that user
could gain root privileges. This was not an issue for the default sudoers file shipped with Ubuntu.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/722-1/

Solution

Update the affected sudo and / or sudo-ldap packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.001

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.1 (CVSS2#E:U/RL:OF/RC:C)

References

BID 33517
CVE CVE-2009-0034
CVE CVE-2011-0008

192.168.1.38 533
XREF USN:722-1
XREF CWE:264

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : sudo_1.6.9p10-1ubuntu3


- Fixed package : sudo_1.6.9p10-1ubuntu3.4

192.168.1.38 534
47109 - Ubuntu 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : fastjar vulnerability (USN-953-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Dan Rosenberg discovered that fastjar incorrectly handled file paths containing '..' when unpacking
archives. If a user or an automated system were tricked into unpacking a specially crafted jar file, arbitrary
files could be overwritten with user privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/953-1/

Solution

Update the affected fastjar package.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0088

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

References

CVE CVE-2010-0831
XREF USN:953-1

Plugin Information

Published: 2010/06/22, Modified: 2019/09/19

192.168.1.38 535
Plugin Output

tcp/0

- Installed package : fastjar_2:0.95-1ubuntu2


- Fixed package : fastjar_2:0.95-1ubuntu2.1

192.168.1.38 536
50824 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : apr-util vulnerability (USN-1022-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that APR-util did not properly handle memory when destroying APR buckets. An attacker
could exploit this and cause a denial of service via memory exhaustion.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1022-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.4253

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 43673
CVE CVE-2010-1623
XREF USN:1022-1

192.168.1.38 537
Plugin Information

Published: 2010/11/28, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libaprutil1_1.2.12+dfsg-3


- Fixed package : libaprutil1_1.2.12+dfsg-3ubuntu0.3

192.168.1.38 538
51583 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : fuse vulnerability (USN-1045-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that FUSE could be tricked into incorrectly updating the mtab file when mounting
filesystems. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial
of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1045-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.5

EPSS Score

0.0007

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

References

CVE CVE-2010-3879
XREF USN:1045-1

Plugin Information

Published: 2011/01/20, Modified: 2019/09/19

192.168.1.38 539
Plugin Output

tcp/0

- Installed package : fuse-utils_2.7.2-1ubuntu2


- Fixed package : fuse-utils_2.7.2-1ubuntu2.2

- Installed package : libfuse2_2.7.2-1ubuntu2


- Fixed package : libfuse2_2.7.2-1ubuntu2.2

192.168.1.38 540
53257 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : openldap, openldap2.3 vulnerabilities
(USN-1100-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenLDAP did not properly check forwarded authentication failures when using a
slave server and chain overlay.
If OpenLDAP were configured in this manner, an attacker could bypass authentication checks by sending an
invalid password to a slave server. (CVE-2011-1024)

It was discovered that OpenLDAP did not properly perform authentication checks to the rootdn when using
the back-ndb backend.
An attacker could exploit this to access the directory by sending an arbitrary password. Ubuntu does not
ship OpenLDAP with back-ndb support by default. This issue did not affect Ubuntu 8.04 LTS.
(CVE-2011-1025)

It was discovered that OpenLDAP did not properly validate modrdn requests. An unauthenticated remote
user could use this to cause a denial of service via application crash. (CVE-2011-1081).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1100-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.5

EPSS Score

0.0603

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

192.168.1.38 541
CVSS v2.0 Temporal Score

5.3 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 46363
BID 46831
CVE CVE-2011-1024
CVE CVE-2011-1025
CVE CVE-2011-1081
XREF USN:1100-1

Plugin Information

Published: 2011/04/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libldap-2.4-2_2.4.9-0ubuntu0.8.04.3


- Fixed package : libldap-2.4-2_2.4.9-0ubuntu0.8.04.5

- Installed package : libldap2-dev_2.4.9-0ubuntu0.8.04.3


- Fixed package : libldap2-dev_2.4.9-0ubuntu0.8.04.5

192.168.1.38 542
51584 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : util-linux update (USN-1045-2)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

USN-1045-1 fixed vulnerabilities in FUSE. This update to util-linux adds support for new options required by
the FUSE update.

It was discovered that FUSE could be tricked into incorrectly updating the mtab file when mounting
filesystems. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial
of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1045-2/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.5

EPSS Score

0.0007

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

References

CVE CVE-2010-3879
XREF USN:1045-2

Plugin Information

192.168.1.38 543
Published: 2011/01/20, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : mount_2.13.1-5ubuntu1


- Fixed package : mount_2.13.1-5ubuntu3.1

- Installed package : util-linux_2.13.1-5ubuntu1


- Fixed package : util-linux_2.13.1-5ubuntu3.1

- Installed package : util-linux-locales_2.13.1-5ubuntu1


- Fixed package : util-linux-locales_2.13.1-5ubuntu3.1

192.168.1.38 544
63285 - Ubuntu 8.04 LTS : glibc regression (USN-1589-2)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

USN-1589-1 fixed vulnerabilities in the GNU C Library. One of the updates exposed a regression in the
floating point parser. This update fixes the problem.

We apologize for the inconvenience.

It was discovered that positional arguments to the printf() family of functions were not handled properly
in the GNU C Library. An attacker could possibly use this to cause a stack-based buffer overflow, creating a
denial of service or possibly execute arbitrary code.
(CVE-2012-3404, CVE-2012-3405, CVE-2012-3406)

It was discovered that multiple integer overflows existed in the strtod(), strtof() and strtold() functions in the
GNU C Library. An attacker could possibly use this to trigger a stack-based buffer overflow, creating a denial
of service or possibly execute arbitrary code. (CVE-2012-3480).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1589-2/

Solution

Update the affected libc6 package.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0156

CVSS v2.0 Base Score

6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

192.168.1.38 545
CVSS v2.0 Temporal Score

5.3 (CVSS2#E:POC/RL:OF/RC:ND)

References

BID 54982
CVE CVE-2012-3404
CVE CVE-2012-3405
CVE CVE-2012-3406
CVE CVE-2012-3480
XREF USN:1589-2

Plugin Information

Published: 2012/12/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libc6_2.7-10ubuntu5


- Fixed package : libc6_2.7-10ubuntu8.3

192.168.1.38 546
55784 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1186-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Rosenberg discovered that IPC structures were not correctly initialized on 64bit systems. A local
attacker could exploit this to read kernel stack memory, leading to a loss of privacy.
(CVE-2010-4073)

Steve Chen discovered that setsockopt did not correctly check MSS values. A local attacker could make a
specially crafted socket call to crash the system, leading to a denial of service. (CVE-2010-4165)

Vladymyr Denysov discovered that Xen virtual CD-ROM devices were not handled correctly. A local attacker
in a guest could make crafted blkback requests that would crash the host, leading to a denial of service.
(CVE-2010-4238)

Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets.
A local attacker could exploit this to allocate all available kernel memory, leading to a denial of service.
(CVE-2010-4249)

Dan Carpenter discovered that the Infiniband driver did not correctly handle certain requests. A local user
could exploit this to crash the system or potentially gain root privileges. (CVE-2010-4649, CVE-2011-1044)

Dan Rosenberg discovered that XFS did not correctly initialize memory.
A local attacker could make crafted ioctl calls to leak portions of kernel stack memory, leading to a loss of
privacy. (CVE-2011-0711)

Timo Warns discovered that MAC partition parsing routines did not correctly calculate block counts. A local
attacker with physical access could plug in a specially crafted block device to crash the system or potentially
gain root privileges. (CVE-2011-1010)

Neil Horman discovered that NFSv4 did not correctly handle certain orders of operation with ACL data. A
remote attacker with access to an NFSv4 mount could exploit this to crash the system, leading to a denial of
service. (CVE-2011-1090)

Vasiliy Kulikov discovered that the netfilter code did not check certain strings copied from userspace. A
local attacker with netfilter access could exploit this to read kernel memory or crash the system, leading to
a denial of service. (CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-2534)

Vasiliy Kulikov discovered that the Acorn Universal Networking driver did not correctly initialize memory.
A remote attacker could send specially crafted traffic to read kernel stack memory, leading to a loss of
privacy. (CVE-2011-1173)

Vasiliy Kulikov discovered that taskstats listeners were not correctly handled. A local attacker could exploit
this to exhaust memory and CPU resources, leading to a denial of service. (CVE-2011-2484).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

192.168.1.38 547
https://usn.ubuntu.com/1186-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

6.7

EPSS Score

0.0059

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.4 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 44830
BID 45037
BID 45073
BID 45795
BID 46073
BID 46417
BID 46488
BID 46492
BID 46766
BID 46919
BID 46921
BID 47990
BID 48383
CVE CVE-2010-4073
CVE CVE-2010-4165
CVE CVE-2010-4238
CVE CVE-2010-4249
CVE CVE-2010-4649

192.168.1.38 548
CVE CVE-2011-0711
CVE CVE-2011-1010
CVE CVE-2011-1044
CVE CVE-2011-1090
CVE CVE-2011-1170
CVE CVE-2011-1171
CVE CVE-2011-1172
CVE CVE-2011-1173
CVE CVE-2011-2484
CVE CVE-2011-2534
XREF USN:1186-1

Plugin Information

Published: 2011/08/09, Modified: 2019/10/16

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.92

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 549
56583 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1236-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the Auerswald usb driver incorrectly handled lengths of the USB string descriptors.
A local attacker with physical access could insert a specially crafted USB device and gain root privileges.
(CVE-2009-4067)

It was discovered that the Stream Control Transmission Protocol (SCTP) implementation incorrectly
calculated lengths. If the net.sctp.addip_enable variable was turned on, a remote attacker could send
specially crafted traffic to crash the system. (CVE-2011-1573)

Vasiliy Kulikov discovered that taskstats did not enforce access restrictions. A local attacker could exploit
this to read certain information, leading to a loss of privacy. (CVE-2011-2494)

Vasiliy Kulikov discovered that /proc/PID/io did not enforce access restrictions. A local attacker could exploit
this to read certain information, leading to a loss of privacy. (CVE-2011-2495)

Dan Kaminsky discovered that the kernel incorrectly handled random sequence number generation. An
attacker could use this flaw to possibly predict sequence numbers and inject packets. (CVE-2011-3188).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1236-1/

Solution

Update the affected packages.

Risk Factor

High

CVSS v3.0 Base Score

6.8 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score

6.1 (CVSS:3.0/E:P/RL:O/RC:C)

VPR Score

192.168.1.38 550
6.7

EPSS Score

0.0157

CVSS v2.0 Base Score

7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.6 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 47308
BID 48687
BID 49289
BID 49408
CVE CVE-2009-4067
CVE CVE-2011-1573
CVE CVE-2011-2494
CVE CVE-2011-2495
CVE CVE-2011-3188
XREF USN:1236-1

Plugin Information

Published: 2011/10/21, Modified: 2020/02/13

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-29.95

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 551
57495 - Ubuntu 8.04 LTS : linux vulnerabilities (USN-1323-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Peter Huewe discovered an information leak in the handling of reading security-related TPM data. A local,
unprivileged user could read the results of a previous TPM command. (CVE-2011-1162)

Clement Lecigne discovered a bug in the HFS filesystem. A local attacker could exploit this to cause a kernel
oops. (CVE-2011-2203)

A flaw was found in the b43 driver in the Linux kernel. An attacker could use this flaw to cause a denial of
service if the system has an active wireless interface using the b43 driver. (CVE-2011-3359)

A flaw was found in how the Linux kernel handles user-defined key types. An unprivileged local user could
exploit this to crash the system. (CVE-2011-4110).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1323-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0063

CVSS v2.0 Base Score

5.4 (CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

4.0 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 552
References

BID 48236
BID 49629
BID 50755
BID 50764
CVE CVE-2011-1162
CVE CVE-2011-2203
CVE CVE-2011-3359
CVE CVE-2011-4110
XREF USN:1323-1

Plugin Information

Published: 2012/01/12, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-30.98

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 553
59292 - Ubuntu 8.04 LTS : linux vulnerability (USN-1454-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

A flaw was found in the Linux's kernels ext4 file system when mounted with a journal. A local, unprivileged
user could exploit this flaw to cause a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1454-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.0004

CVSS v2.0 Base Score

4.9 (CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)

CVSS v2.0 Temporal Score

4.3 (CVSS2#E:ND/RL:OF/RC:C)

References

BID 51945
CVE CVE-2011-4086
XREF USN:1454-1

192.168.1.38 554
Plugin Information

Published: 2012/05/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-31.101

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 555
63122 - Ubuntu 8.04 LTS : linux vulnerability (USN-1650-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Rodrigo Freire discovered a flaw in the Linux kernel's TCP illinois congestion control algorithm. A local
attacker could use this to cause a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1650-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

4.4

EPSS Score

0.0004

CVSS v2.0 Base Score

4.7 (CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C)

References

CVE CVE-2012-4565
XREF USN:1650-1

Plugin Information

Published: 2012/12/02, Modified: 2019/09/19

192.168.1.38 556
Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-32.106

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 557
63221 - Ubuntu 8.04 LTS : linux vulnerability (USN-1660-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Zhang Zuotao discovered a bug in the Linux kernel's handling of overlapping fragments in ipv6. A remote
attacker could exploit this flaw to bypass firewalls and initial new network connections that should have
been blocked by the firewall.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1660-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.4

EPSS Score

0.0063

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

References

CVE CVE-2012-4444
XREF USN:1660-1

Plugin Information

Published: 2012/12/11, Modified: 2019/09/19

192.168.1.38 558
Plugin Output

tcp/0

- Installed package : linux-image-2.6.24-16-server_2.6.24-16.30


- Fixed package : linux-image-2.6.24-<ANY>-server_2.6.24-32.107

Because Debian/Ubuntu linux packages increment their package name numbers as


well as their version numbers, an update may not be available for the
current kernel level, but the package will still be vulnerable. You may
need to update the kernel level in order to get the latest security
fixes available.

192.168.1.38 559
33389 - Ubuntu 8.04 LTS : openssl vulnerabilities (USN-620-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that OpenSSL was vulnerable to a double-free when using TLS server extensions.
A remote attacker could send a crafted packet and cause a denial of service via application crash in
applications linked against OpenSSL. Ubuntu 8.04 LTS does not compile TLS server extensions by default.
(CVE-2008-0891)

It was discovered that OpenSSL could dereference a NULL pointer. If a user or automated system were
tricked into connecting to a malicious server with particular cipher suites, a remote attacker could cause a
denial of service via application crash. (CVE-2008-1672).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/620-1/

Solution

Update the affected packages.

Risk Factor

Medium

VPR Score

3.6

EPSS Score

0.1336

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:ND/RL:OF/RC:C)

192.168.1.38 560
References

BID 29405
CVE CVE-2008-0891
CVE CVE-2008-1672
XREF USN:620-1
XREF CWE:189
XREF CWE:287

Plugin Information

Published: 2008/07/02, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : openssl_0.9.8g-4ubuntu3


- Fixed package : openssl_0.9.8g-4ubuntu3.3

192.168.1.38 561
62619 - Ubuntu 8.04 LTS : python2.5 vulnerabilities (USN-1613-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that Python would prepend an empty string to sys.path under certain circumstances. A
local attacker with write access to the current working directory could exploit this to execute arbitrary code.
(CVE-2008-5983)

It was discovered that the audioop module did not correctly perform input validation. If a user or
automated system were tricked into opening a crafted audio file, an attacker could cause a denial of service
via application crash. (CVE-2010-1634, CVE-2010-2089)

Giampaolo Rodola discovered several race conditions in the smtpd module. A remote attacker could exploit
this to cause a denial of service via daemon outage. (CVE-2010-3493)

It was discovered that the CGIHTTPServer module did not properly perform input validation on certain
HTTP GET requests. A remote attacker could potentially obtain access to CGI script source files.
(CVE-2011-1015)

Niels Heinen discovered that the urllib and urllib2 modules would process Location headers that specify
a redirection to file: URLs. A remote attacker could exploit this to obtain sensitive information or cause a
denial of service. (CVE-2011-1521)

It was discovered that SimpleHTTPServer did not use a charset parameter in the Content-Type HTTP
header. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks against
Internet Explorer 7 users. (CVE-2011-4940)

It was discovered that Python distutils contained a race condition when creating the ~/.pypirc file. A local
attacker could exploit this to obtain sensitive information. (CVE-2011-4944)

It was discovered that SimpleXMLRPCServer did not properly validate its input when handling HTTP POST
requests. A remote attacker could exploit this to cause a denial of service via excessive CPU utilization.
(CVE-2012-0845)

It was discovered that the Expat module in Python 2.5 computed hash values without restricting the ability
to trigger hash collisions predictably. If a user or application using pyexpat were tricked into opening
a crafted XML file, an attacker could cause a denial of service by consuming excessive CPU resources.
(CVE-2012-0876)

Tim Boddy discovered that the Expat module in Python 2.5 did not properly handle memory reallocation
when processing XML files. If a user or application using pyexpat were tricked into opening a crafted
XML file, an attacker could cause a denial of service by consuming excessive memory resources.
(CVE-2012-1148).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

192.168.1.38 562
https://usn.ubuntu.com/1613-1/

Solution

Update the affected python2.5 and / or python2.5-minimal packages.

Risk Factor

Medium

VPR Score

5.9

EPSS Score

0.1599

CVSS v2.0 Base Score

6.9 (CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

5.4 (CVSS2#E:POC/RL:OF/RC:C)

References

CVE CVE-2008-5983
CVE CVE-2010-1634
CVE CVE-2010-2089
CVE CVE-2010-3493
CVE CVE-2011-1015
CVE CVE-2011-1521
CVE CVE-2011-4940
CVE CVE-2011-4944
CVE CVE-2012-0845
CVE CVE-2012-0876
CVE CVE-2012-1148
XREF USN:1613-1

Plugin Information

Published: 2012/10/18, Modified: 2019/09/19

Plugin Output

192.168.1.38 563
tcp/0

- Installed package : python2.5_2.5.2-2ubuntu6.1


- Fixed package : python2.5_2.5.2-2ubuntu6.2

- Installed package : python2.5-minimal_2.5.2-2ubuntu6.1


- Fixed package : python2.5-minimal_2.5.2-2ubuntu6.2

192.168.1.38 564
42263 - Unencrypted Telnet Server

Synopsis

The remote Telnet server transmits traffic in cleartext.

Description

The remote host is running a Telnet server over an unencrypted channel.

Using Telnet over an unencrypted channel is not recommended as logins, passwords, and commands are
transferred in cleartext. This allows a remote, man-in-the-middle attacker to eavesdrop on a Telnet session
to obtain credentials or other sensitive information and to modify traffic exchanged between a client and
server.

SSH is preferred over Telnet since it protects credentials from eavesdropping and can tunnel additional
data streams such as an X11 session.

Solution

Disable the Telnet service and use SSH instead.

Risk Factor

Medium

CVSS v3.0 Base Score

6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

Plugin Information

Published: 2009/10/27, Modified: 2024/01/16

Plugin Output

tcp/23/telnet

Nessus collected the following banner from the remote Telnet server :

------------------------------ snip ------------------------------


_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|
Warning: Never expose this VM to an untrusted network!

192.168.1.38 565
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
metasploitable login:
------------------------------ snip ------------------------------

192.168.1.38 566
10114 - ICMP Timestamp Request Remote Date Disclosure

Synopsis

It is possible to determine the exact time set on the remote host.

Description

The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that
is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-
based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect,
but usually within 1000 seconds of the actual system time.

Solution

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

Risk Factor

Low

VPR Score

4.2

EPSS Score

0.8808

CVSS v2.0 Base Score

2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)

References

CVE CVE-1999-0524
XREF CWE:200

Plugin Information

Published: 1999/08/01, Modified: 2024/10/07

Plugin Output

icmp/0

192.168.1.38 567
The difference between the local and remote clocks is -40 seconds.

192.168.1.38 568
70658 - SSH Server CBC Mode Ciphers Enabled

Synopsis

The SSH server is configured to use Cipher Block Chaining.

Description

The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker
to recover the plaintext message from the ciphertext.

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable
software versions.

Solution

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable
CTR or GCM cipher mode encryption.

Risk Factor

Low

CVSS v3.0 Base Score

3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

VPR Score

3.4

EPSS Score

0.5254

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

1.9 (CVSS2#E:U/RL:OF/RC:C)

References

BID 32319
CVE CVE-2008-5161
XREF CERT:958563
XREF CWE:200

192.168.1.38 569
Plugin Information

Published: 2013/10/28, Modified: 2023/10/27

Plugin Output

tcp/22/ssh

The following client-to-server Cipher Block Chaining (CBC) algorithms


are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
[email protected]

The following server-to-client Cipher Block Chaining (CBC) algorithms


are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
[email protected]

192.168.1.38 570
153953 - SSH Weak Key Exchange Algorithms Enabled

Synopsis

The remote SSH server is configured to allow weak key exchange algorithms.

Description

The remote SSH server is configured to allow key exchange algorithms which are considered weak.

This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for
Secure Shell (SSH) RFC9142. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and
MUST NOT be enabled. This includes:

diffie-hellman-group-exchange-sha1

diffie-hellman-group1-sha1

gss-gex-sha1-*

gss-group1-sha1-*

gss-group14-sha1-*

rsa1024-sha1

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable
software versions.

See Also

https://datatracker.ietf.org/doc/html/rfc9142

Solution

Contact the vendor or consult product documentation to disable the weak algorithms.

Risk Factor

Low

CVSS v3.0 Base Score

3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2021/10/13, Modified: 2024/03/22

192.168.1.38 571
Plugin Output

tcp/22/ssh

The following weak key exchange algorithms are enabled :

diffie-hellman-group-exchange-sha1
diffie-hellman-group1-sha1

192.168.1.38 572
71049 - SSH Weak MAC Algorithms Enabled

Synopsis

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

Description

The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are
considered weak.

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable
software versions.

Solution

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

Risk Factor

Low

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2013/11/22, Modified: 2016/12/14

Plugin Output

tcp/22/ssh

The following client-to-server Message Authentication Code (MAC) algorithms


are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms


are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

192.168.1.38 573
83875 - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)

Synopsis

The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to
1024 bits.

Description

The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal
to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount
of time (depending on modulus size and attacker resources). This may allow an attacker to recover the
plaintext or potentially violate the integrity of connections.

See Also

https://weakdh.org/

Solution

Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.

Risk Factor

Low

CVSS v3.0 Base Score

3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score

3.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

3.9

EPSS Score

0.9736

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

1.9 (CVSS2#E:U/RL:OF/RC:C)

192.168.1.38 574
References

BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004

Plugin Information

Published: 2015/05/28, Modified: 2024/09/11

Plugin Output

tcp/25/smtp

Vulnerable connection combinations :

SSL/TLS version : SSLv3


Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Diffie-Hellman MODP size (bits) : 512
Logjam attack difficulty : Easy (could be carried out by individuals)

SSL/TLS version : TLSv1.0


Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Diffie-Hellman MODP size (bits) : 512
Logjam attack difficulty : Easy (could be carried out by individuals)

192.168.1.38 575
83738 - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)

Synopsis

The remote host supports a set of weak ciphers.

Description

The remote host supports EXPORT_DHE cipher suites with keys less than or equal to 512 bits. Through
cryptanalysis, a third party can find the shared secret in a short amount of time.

A man-in-the middle attacker may be able to downgrade the session to use EXPORT_DHE cipher suites.
Thus, it is recommended to remove support for weak cipher suites.

See Also

https://weakdh.org/

Solution

Reconfigure the service to remove support for EXPORT_DHE cipher suites.

Risk Factor

Low

CVSS v3.0 Base Score

3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score

3.2 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

3.9

EPSS Score

0.9736

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

2.2 (CVSS2#E:U/RL:ND/RC:C)

192.168.1.38 576
References

BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004

Plugin Information

Published: 2015/05/21, Modified: 2022/12/05

Plugin Output

tcp/25/smtp

EXPORT_DHE cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 577
78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)

Synopsis

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Description

The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL 3.0 connections.

As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1
or newer is supported by the client and service.

The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that
cannot disable SSLv3 immediately should enable this mechanism.

This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.

See Also

https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Solution

Disable SSLv3.

Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
disabled.

Risk Factor

Medium

CVSS v3.0 Base Score

3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)

CVSS v3.0 Temporal Score

3.1 (CVSS:3.0/E:P/RL:O/RC:C)

192.168.1.38 578
VPR Score

4.9

EPSS Score

0.9749

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.4 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 70574
CVE CVE-2014-3566
XREF CERT:577193

Plugin Information

Published: 2014/10/15, Modified: 2023/06/23

Plugin Output

tcp/25/smtp

Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the


Fallback SCSV mechanism is not supported, allowing connections to be "rolled
back" to SSLv3.

192.168.1.38 579
78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)

Synopsis

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Description

The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as
POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a
victim application to repeatedly send the same data over newly created SSL 3.0 connections.

As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1
or newer is supported by the client and service.

The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients;
however, it can only protect connections when the client and service support the mechanism. Sites that
cannot disable SSLv3 immediately should enable this mechanism.

This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is
the only way to completely mitigate the vulnerability.

See Also

https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Solution

Disable SSLv3.

Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be
disabled.

Risk Factor

Medium

CVSS v3.0 Base Score

3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)

CVSS v3.0 Temporal Score

3.1 (CVSS:3.0/E:P/RL:O/RC:C)

192.168.1.38 580
VPR Score

4.9

EPSS Score

0.9749

CVSS v2.0 Base Score

4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

3.4 (CVSS2#E:POC/RL:OF/RC:C)

References

BID 70574
CVE CVE-2014-3566
XREF CERT:577193

Plugin Information

Published: 2014/10/15, Modified: 2023/06/23

Plugin Output

tcp/5432/postgresql

Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the


Fallback SCSV mechanism is not supported, allowing connections to be "rolled
back" to SSLv3.

192.168.1.38 581
44335 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : fuse vulnerability (USN-892-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Dan Rosenberg discovered that FUSE did not correctly check mount locations. A local attacker, with access
to use FUSE, could unmount arbitrary locations, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/892-1/

Solution

Update the affected packages.

Risk Factor

Low

VPR Score

3.7

EPSS Score

0.0004

CVSS v2.0 Base Score

3.3 (CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P)

References

CVE CVE-2010-0789
XREF USN:892-1
XREF CWE:59

Plugin Information

Published: 2010/01/29, Modified: 2019/09/19

192.168.1.38 582
Plugin Output

tcp/0

- Installed package : fuse-utils_2.7.2-1ubuntu2


- Fixed package : fuse-utils_2.7.2-1ubuntu2.1

- Installed package : libfuse2_2.7.2-1ubuntu2


- Fixed package : libfuse2_2.7.2-1ubuntu2.1

192.168.1.38 583
45343 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : samba vulnerability (USN-918-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered the Samba handled symlinks in an unexpected way when both 'wide links' and 'UNIX
extensions' were enabled, which is the default. A remote attacker could create symlinks and access
arbitrary files from the server.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/918-1/

Solution

Update the affected packages.

Risk Factor

Low

VPR Score

6.0

EPSS Score

0.0287

CVSS v2.0 Base Score

3.5 (CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N)

CVSS v2.0 Temporal Score

2.9 (CVSS2#E:F/RL:OF/RC:C)

References

BID 38111
CVE CVE-2010-0926
XREF USN:918-1

192.168.1.38 584
XREF CWE:22

Plugin Information

Published: 2010/03/25, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : samba_3.0.20-0.1ubuntu1


- Fixed package : samba_3.0.28a-1ubuntu4.11

- Installed package : samba-common_3.0.20-0.1ubuntu1


- Fixed package : samba-common_3.0.28a-1ubuntu4.11

192.168.1.38 585
39786 - Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 : dbus vulnerability (USN-799-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that the D-Bus library did not correctly validate signatures. If a local user sent a specially
crafted D-Bus key, they could spoof a valid signature and bypass security policies.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/799-1/

Solution

Update the affected packages.

Risk Factor

Low

VPR Score

7.3

EPSS Score

0.0071

CVSS v2.0 Base Score

3.6 (CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:P)

CVSS v2.0 Temporal Score

2.7 (CVSS2#E:U/RL:OF/RC:C)

References

BID 31602
CVE CVE-2009-1189
XREF USN:799-1

192.168.1.38 586
XREF CWE:20

Plugin Information

Published: 2009/07/14, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : libdbus-1-3_1.1.20-1ubuntu1


- Fixed package : libdbus-1-3_1.1.20-1ubuntu3.3

192.168.1.38 587
36904 - Ubuntu 7.10 / 8.04 LTS : postfix vulnerability (USN-642-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Wietse Venema discovered that Postfix leaked internal file descriptors when executing non-Postfix
commands. A local attacker could exploit this to cause Postfix to run out of descriptors, leading to a denial
of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/642-1/

Solution

Update the affected packages.

Risk Factor

Low

VPR Score

4.4

EPSS Score

0.0004

CVSS v2.0 Base Score

2.1 (CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

1.6 (CVSS2#E:U/RL:OF/RC:C)

References

BID 30977
CVE CVE-2008-3889
XREF USN:642-1

192.168.1.38 588
XREF CWE:20

Plugin Information

Published: 2009/04/23, Modified: 2021/01/19

Plugin Output

tcp/0

- Installed package : postfix_2.5.1-2ubuntu1


- Fixed package : postfix_2.5.1-2ubuntu1.2

192.168.1.38 589
56970 - Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : apt vulnerability (USN-1283-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that APT incorrectly handled the Verify-Host configuration option. If a remote attacker
were able to perform a man-in-the-middle attack, this flaw could potentially be used to steal repository
credentials. This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2011-3634)

USN-1215-1 fixed a vulnerability in APT by disabling the apt-key net-update option. This update re-enables
the option with corrected verification.

It was discovered that the apt-key utility incorrectly verified GPG keys when downloaded via the net-update
option. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be
used to install altered packages.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1283-1/

Solution

Update the affected apt package.

Risk Factor

Low

VPR Score

6.1

EPSS Score

0.0009

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

References

CVE CVE-2011-3634

192.168.1.38 590
XREF USN:1283-1

Plugin Information

Published: 2011/11/29, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apt_0.7.9ubuntu17


- Fixed package : apt_0.7.9ubuntu17.4

192.168.1.38 591
59554 - Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : apt vulnerability (USN-1477-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

Georgi Guninski discovered that APT did not properly validate imported keyrings via apt-key net-update.
USN-1475-1 added additional verification for imported keyrings, but it was insufficient. If a remote attacker
were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered
packages. This update corrects the issue by disabling the net-update option completely. A future update
will re-enable the option with corrected verification.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1477-1/

Solution

Update the affected apt package.

Risk Factor

Low

VPR Score

4.4

EPSS Score

0.0035

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

References

CVE CVE-2012-0954
XREF USN:1477-1

Plugin Information

192.168.1.38 592
Published: 2012/06/18, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apt_0.7.9ubuntu17


- Fixed package : apt_0.7.9ubuntu17.6

192.168.1.38 593
62869 - Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : apache2 vulnerabilities
(USN-1627-1)

Synopsis

The remote Ubuntu host is missing a security-related patch.

Description

It was discovered that the mod_negotiation module incorrectly handled certain filenames, which could
result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With
cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server
request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as
passwords), within the same domain.
(CVE-2012-2687)

It was discovered that the Apache HTTP Server was vulnerable to the 'CRIME' SSL data compression attack.
Although this issue had been mitigated on the client with newer web browsers, this update also disables
SSL data compression on the server. A new SSLCompression directive for Apache has been backported that
may be used to re-enable SSL data compression in certain environments. For more information, please
refer to:
http://httpd.apache.org/docs/2.4/mod/mod_ssl.html#sslcompression (CVE-2012-4929).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1627-1/

Solution

Update the affected apache2.2-common package.

Risk Factor

Low

VPR Score

4.9

EPSS Score

0.0068

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)

192.168.1.38 594
CVSS v2.0 Temporal Score

1.9 (CVSS2#E:U/RL:OF/RC:C)

References

BID 55131
BID 55704
CVE CVE-2012-2687
CVE CVE-2012-4929
XREF USN:1627-1

Plugin Information

Published: 2012/11/09, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : apache2.2-common_2.2.8-1ubuntu0.15


- Fixed package : apache2.2-common_2.2.8-1ubuntu0.24

192.168.1.38 595
51572 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : dbus vulnerability (USN-1044-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

Remi Denis-Courmont discovered that D-Bus did not properly validate the number of nested variants when
validating D-Bus messages. A local attacker could exploit this to cause a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1044-1/

Solution

Update the affected packages.

Risk Factor

Low

VPR Score

7.3

EPSS Score

0.0004

CVSS v2.0 Base Score

2.1 (CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVSS v2.0 Temporal Score

1.6 (CVSS2#E:U/RL:OF/RC:ND)

References

BID 45377
CVE CVE-2010-4352
XREF USN:1044-1

192.168.1.38 596
Plugin Information

Published: 2011/01/19, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : libdbus-1-3_1.1.20-1ubuntu1


- Fixed package : libdbus-1-3_1.1.20-1ubuntu3.4

192.168.1.38 597
52479 - Ubuntu 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : fuse vulnerabilities (USN-1077-1)

Synopsis

The remote Ubuntu host is missing one or more security-related patches.

Description

It was discovered that FUSE would incorrectly follow symlinks when checking mountpoints under certain
conditions. A local attacker, with access to use FUSE, could unmount arbitrary locations, leading to a denial
of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu
security advisory. Tenable has attempted to automatically clean and format it as much as possible without
introducing additional issues.

See Also

https://usn.ubuntu.com/1077-1/

Solution

Update the affected packages.

Risk Factor

Low

VPR Score

3.7

EPSS Score

0.0004

CVSS v2.0 Base Score

3.3 (CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:P)

CVSS v2.0 Temporal Score

2.4 (CVSS2#E:U/RL:OF/RC:C)

References

BID 37983
BID 46103
CVE CVE-2010-0789

192.168.1.38 598
CVE CVE-2011-0541
CVE CVE-2011-0542
CVE CVE-2011-0543
XREF USN:1077-1
XREF CWE:59

Plugin Information

Published: 2011/03/01, Modified: 2019/09/19

Plugin Output

tcp/0

- Installed package : fuse-utils_2.7.2-1ubuntu2


- Fixed package : fuse-utils_2.7.2-1ubuntu2.3

- Installed package : libfuse2_2.7.2-1ubuntu2


- Fixed package : libfuse2_2.7.2-1ubuntu2.3

192.168.1.38 599
10407 - X Server Detection

Synopsis

An X11 server is listening on the remote host

Description

The remote host is running an X11 server. X11 is a client-server protocol that can be used to display
graphical applications running on a given host on a remote client.

Since the X11 traffic is not ciphered, it is possible for an attacker to eavesdrop on the connection.

Solution

Restrict access to this port. If the X11 client/server facility is not used, disable TCP support in X11 entirely (-
nolisten tcp).

Risk Factor

Low

CVSS v2.0 Base Score

2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)

Plugin Information

Published: 2000/05/12, Modified: 2019/03/05

Plugin Output

tcp/6000/x11

X11 Version : 11.0

192.168.1.38 600
21186 - A JP Connector Detection

Synopsis

There is an A JP connector listening on the remote host.

Description

The remote host is running an A JP (Apache JServ Protocol) connector, a service by which a standalone web
server such as Apache communicates over TCP with a Java servlet container such as Tomcat.

See Also

http://tomcat.apache.org/connectors-doc/
http://tomcat.apache.org/connectors-doc/ajp/ajpv13a.html

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2006/04/05, Modified: 2019/11/22

Plugin Output

tcp/8009/ajp13

The connector listing on this port supports the ajp13 protocol.

192.168.1.38 601
18261 - Apache Banner Linux Distribution Disclosure

Synopsis

The name of the Linux distribution running on the remote host was found in the banner of the web server.

Description

Nessus was able to extract the banner of the Apache web server and determine which Linux distribution
the remote host is running.

Solution

If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and
restart Apache.

Risk Factor

None

Plugin Information

Published: 2005/05/15, Modified: 2022/03/21

Plugin Output

tcp/0

The Linux distribution detected was :


- Ubuntu 8.04 (gutsy)

192.168.1.38 602
141394 - Apache HTTP Server Installed (Linux)

Synopsis

The remote host has Apache HTTP Server software installed.

Description

Apache HTTP Server is installed on the remote Linux host.

See Also

https://httpd.apache.org/

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0530

Plugin Information

Published: 2020/10/12, Modified: 2024/12/03

Plugin Output

tcp/0

Path : /usr/sbin/apache2
Version : 2.2.8
Associated Package : apache2-mpm-prefork: /usr/sbin/apache2
Managed by OS : True
Running : yes

Configs found :
- /etc/apache2/apache2.conf

Loaded modules :

192.168.1.38 603
48204 - Apache HTTP Server Version

Synopsis

It is possible to obtain the version number of the remote Apache HTTP server.

Description

The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the
version number from the banner.

See Also

https://httpd.apache.org/

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530

Plugin Information

Published: 2010/07/30, Modified: 2023/08/17

Plugin Output

tcp/80/www

URL : http://192.168.1.38/
Version : 2.2.99
Source : Server: Apache/2.2.8 (Ubuntu) DAV/2
backported : 1
modules : DAV/2
os : ConvertedUbuntu

192.168.1.38 604
156000 - Apache Log4j Installed (Linux / Unix)

Synopsis

Apache Log4j, a logging API, is installed on the remote Linux / Unix host.

Description

One or more instances of Apache Log4j, a logging API, are installed on the remote Linux / Unix Host.

The plugin timeout can be set to a custom value other than the plugin's default of 45 minutes via the
'timeout.156000' scanner setting in Nessus 8.15.1 or later.

Please see https://docs.tenable.com/nessus/Content/SettingsAdvanced.htm#Custom for more


information.

See Also

https://logging.apache.org/log4j/2.x/

Solution

n/a

Risk Factor

None

References

XREF IAVA:0001-A-0650
XREF IAVT:0001-T-0941

Plugin Information

Published: 2021/12/10, Modified: 2024/12/03

Plugin Output

tcp/0

Path : /usr/share/java/log4j-1.2.15.jar
Version : 1.2.15
JMSAppender.class association : Not Found
JdbcAppender.class association : Found
JndiLookup.class association : Not Found
Method : Package manager

192.168.1.38 605
39446 - Apache Tomcat Detection

Synopsis

The remote web server is an Apache Tomcat server.

Description

Nessus was able to detect a remote Apache Tomcat web server.

See Also

https://tomcat.apache.org/

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0535

Plugin Information

Published: 2009/06/18, Modified: 2024/11/14

Plugin Output

tcp/8180/www

URL : http://192.168.1.38:8180/
Version : 5.5
backported : 0
source : Apache Tomcat/5.5

192.168.1.38 606
34098 - BIOS Info (SSH)

Synopsis

BIOS info could be read.

Description

Using SMBIOS and UEFI, it was possible to get BIOS info.

Solution

N/A

Risk Factor

None

Plugin Information

Published: 2008/09/08, Modified: 2024/02/12

Plugin Output

tcp/0

Version : 1.2
Vendor : innotek GmbH
Release Date : 12/01/2006
Secure boot : disabled

192.168.1.38 607
39519 - Backported Security Patch Detection (FTP)

Synopsis

Security patches are backported.

Description

Security patches may have been 'backported' to the remote FTP server without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.

See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/06/25, Modified: 2015/07/07

Plugin Output

tcp/2121/ftp

Local checks have been enabled.

192.168.1.38 608
84574 - Backported Security Patch Detection (PHP)

Synopsis

Security patches have been backported.

Description

Security patches may have been 'backported' to the remote PHP install without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.

See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2015/07/07, Modified: 2024/11/22

Plugin Output

tcp/80/www

Local checks have been enabled.

192.168.1.38 609
39520 - Backported Security Patch Detection (SSH)

Synopsis

Security patches are backported.

Description

Security patches may have been 'backported' to the remote SSH server without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.

See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/06/25, Modified: 2015/07/07

Plugin Output

tcp/22/ssh

Local checks have been enabled.

192.168.1.38 610
39521 - Backported Security Patch Detection (WWW)

Synopsis

Security patches are backported.

Description

Security patches may have been 'backported' to the remote HTTP server without changing its version
number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.

See Also

https://access.redhat.com/security/updates/backporting/?sc_cid=3093

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/06/25, Modified: 2015/07/07

Plugin Output

tcp/80/www

Local checks have been enabled.

192.168.1.38 611
45590 - Common Platform Enumeration (CPE)

Synopsis

It was possible to enumerate CPE names that matched on the remote system.

Description

By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform
Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE
based on the information available from the scan.

See Also

http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2010/04/21, Modified: 2024/11/22

Plugin Output

tcp/0

The remote operating system matched the following CPE :

cpe:/o:canonical:ubuntu_linux -> Canonical Ubuntu Linux

Following application CPE's matched on the remote system :

cpe:/a:apache:http_server:2.2.8 -> Apache Software Foundation Apache HTTP Server


cpe:/a:apache:http_server:2.2.99 -> Apache Software Foundation Apache HTTP Server
cpe:/a:apache:log4j:1.2.15 -> Apache Software Foundation log4j
cpe:/a:apache:tomcat:5.5 -> Apache Software Foundation Tomcat
cpe:/a:haxx:curl:7.18.0 -> Haxx Curl
cpe:/a:haxx:libcurl:7.18.0 -> Haxx libcurl
cpe:/a:isc:bind:9.4. -> ISC BIND
cpe:/a:isc:bind:9.4.2 -> ISC BIND
cpe:/a:mysql:mysql:5.0.51a-3ubuntu5 -> MySQL MySQL
cpe:/a:openbsd:openssh:4.7 -> OpenBSD OpenSSH
cpe:/a:openbsd:openssh:4.7p1 -> OpenBSD OpenSSH
cpe:/a:openssl:openssl:0.9.8g -> OpenSSL Project OpenSSL

192.168.1.38 612
cpe:/a:php:php:5.2.4 -> PHP PHP
cpe:/a:php:php:5.2.4-2ubuntu5.10 -> PHP PHP
cpe:/a:postgresql:postgresql -> PostgreSQL
cpe:/a:postgresql:postgresql:8.3.1 -> PostgreSQL
cpe:/a:ruby-lang:ruby:1.8.6.111 -> Ruby-lang Ruby
cpe:/a:samba:samba:3.0.20 -> Samba Samba
cpe:/a:vim:vim:7.1 -> Vim

192.168.1.38 613
182774 - Curl Installed (Linux / Unix)

Synopsis

Curl is installed on the remote Linux / Unix host.

Description

Curl (also known as curl and cURL) is installed on the remote Linux / Unix host.

Additional information:

- More paths will be searched and the timeout for the search will be increased if 'Perform thorough tests'
setting is enabled.

- The plugin timeout can be set to a custom value other than the plugin's default of 30 minutes via the
'timeout.182774' scanner setting in Nessus 8.15.1 or later.

Please see https://docs.tenable.com/nessus/Content/SettingsAdvanced.htm#Custom for more


information.

See Also

https://curl.se/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2023/10/09, Modified: 2024/12/03

Plugin Output

tcp/0

Path : curl 7.18.0-1ubuntu2.3 (via package manager)


Version : 7.18.0
Managed by OS : True

192.168.1.38 614
10028 - DNS Server BIND version Directive Remote Version Detection

Synopsis

It is possible to obtain the version number of the remote DNS server.

Description

The remote host is running BIND or another DNS server that reports its version number when it receives a
special request for the text 'version.bind' in the domain 'chaos'.

This version is not necessarily accurate and could even be forged, as some DNS servers send the
information based on a configuration file.

Solution

It is possible to hide the version number of BIND by using the 'version' directive in the 'options' section in
named.conf.

Risk Factor

None

References

XREF IAVT:0001-T-0583

Plugin Information

Published: 1999/10/12, Modified: 2022/10/12

Plugin Output

udp/53/dns

Version : 9.4.2

192.168.1.38 615
35373 - DNS Server DNSSEC Aware Resolver

Synopsis

The remote DNS resolver is DNSSEC-aware.

Description

The remote DNS resolver accepts DNSSEC options. This means that it may verify the authenticity of
DNSSEC protected zones if it is configured to trust their keys.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/01/15, Modified: 2013/11/21

Plugin Output

udp/53/dns

192.168.1.38 616
11002 - DNS Server Detection

Synopsis

A DNS server is listening on the remote host.

Description

The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.

See Also

https://en.wikipedia.org/wiki/Domain_Name_System

Solution

Disable this service if it is not needed or restrict access to internal hosts only if the service is available
externally.

Risk Factor

None

Plugin Information

Published: 2003/02/13, Modified: 2017/05/16

Plugin Output

tcp/53/dns

192.168.1.38 617
11002 - DNS Server Detection

Synopsis

A DNS server is listening on the remote host.

Description

The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames
and IP addresses.

See Also

https://en.wikipedia.org/wiki/Domain_Name_System

Solution

Disable this service if it is not needed or restrict access to internal hosts only if the service is available
externally.

Risk Factor

None

Plugin Information

Published: 2003/02/13, Modified: 2017/05/16

Plugin Output

udp/53/dns

192.168.1.38 618
72779 - DNS Server Version Detection

Synopsis

Nessus was able to obtain version information on the remote DNS server.

Description

Nessus was able to obtain version information by sending a special TXT record query to the remote host.

Note that this version is not necessarily accurate and could even be forged, as some DNS servers send the
information based on a configuration file.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0937

Plugin Information

Published: 2014/03/03, Modified: 2024/09/24

Plugin Output

tcp/53/dns

DNS server answer for "version.bind" (over TCP) :

9.4.2

192.168.1.38 619
35371 - DNS Server hostname.bind Map Hostname Disclosure

Synopsis

The DNS server discloses the remote host name.

Description

It is possible to learn the remote host name by querying the remote DNS server for 'hostname.bind' in the
CHAOS domain.

Solution

It may be possible to disable this feature. Consult the vendor's documentation for more information.

Risk Factor

None

Plugin Information

Published: 2009/01/15, Modified: 2011/09/14

Plugin Output

udp/53/dns

The remote host name is :

metasploitable

192.168.1.38 620
55472 - Device Hostname

Synopsis

It was possible to determine the remote system hostname.

Description

This plugin reports a device's hostname collected via SSH or WMI.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/06/30, Modified: 2024/11/22

Plugin Output

tcp/0

Hostname : metasploitable
metasploitable (hostname command)

192.168.1.38 621
54615 - Device Type

Synopsis

It is possible to guess the remote device type.

Description

Based on the remote operating system, it is possible to determine what the remote system type is (eg: a
printer, router, general-purpose computer, etc).

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/05/23, Modified: 2022/09/09

Plugin Output

tcp/0

Remote device type : general-purpose


Confidence level : 100

192.168.1.38 622
25203 - Enumerate IPv4 Interfaces via SSH

Synopsis

Nessus was able to enumerate the IPv4 interfaces on the remote host.

Description

Nessus was able to enumerate the network interfaces configured with IPv4 addresses by connecting to the
remote host via SSH using the supplied credentials.

Solution

Disable any unused IPv4 interfaces.

Risk Factor

None

Plugin Information

Published: 2007/05/11, Modified: 2024/11/20

Plugin Output

tcp/0

The following IPv4 addresses are set on the remote host :

- 192.168.1.38 (on interface eth0)


- 127.0.0.1 (on interface lo)

192.168.1.38 623
25202 - Enumerate IPv6 Interfaces via SSH

Synopsis

Nessus was able to enumerate the IPv6 interfaces on the remote host.

Description

Nessus was able to enumerate the network interfaces configured with IPv6 addresses by connecting to the
remote host via SSH using the supplied credentials.

Solution

Disable IPv6 if you are not actually using it. Otherwise, disable any unused IPv6 interfaces.

Risk Factor

None

Plugin Information

Published: 2007/05/11, Modified: 2024/11/20

Plugin Output

tcp/0

The following IPv6 interfaces are set on the remote host :

- 2401:4900:1f29:3cec:a00:27ff:fe68:92c1 (on interface eth0)


- fe80::a00:27ff:fe68:92c1 (on interface eth0)
- ::1 (on interface lo)

192.168.1.38 624
33276 - Enumerate MAC Addresses via SSH

Synopsis

Nessus was able to enumerate MAC addresses on the remote host.

Description

Nessus was able to enumerate MAC addresses by connecting to the remote host via SSH with the supplied
credentials.

Solution

Disable any unused interfaces.

Risk Factor

None

Plugin Information

Published: 2008/06/30, Modified: 2022/12/20

Plugin Output

tcp/0

The following MAC address exists on the remote host :

- 08:00:27:68:92:c1 (interface eth0)

192.168.1.38 625
170170 - Enumerate the Network Interface configuration via SSH

Synopsis

Nessus was able to parse the Network Interface data on the remote host.

Description

Nessus was able to parse the Network Interface data on the remote host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2023/01/19, Modified: 2023/11/17

Plugin Output

tcp/0

lo:
IPv4:
- Address : 127.0.0.1
Netmask : 255.0.0.0
IPv6:
- Address : ::1
Prefixlen : 128
Scope : host
eth0:
MAC : 08:00:27:68:92:c1
IPv4:
- Address : 192.168.1.38
Netmask : 255.255.255.0
Broadcast : 192.168.1.255
IPv6:
- Address : 2401:4900:1f29:3cec:a00:27ff:fe68:92c1
Prefixlen : 64
Scope : global
- Address : fe80::a00:27ff:fe68:92c1
Prefixlen : 64
Scope : link

192.168.1.38 626
179200 - Enumerate the Network Routing configuration via SSH

Synopsis

Nessus was able to retrieve network routing information from the remote host.

Description

Nessus was able to retrieve network routing information the remote host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2023/08/02, Modified: 2023/08/02

Plugin Output

tcp/0

Gateway Routes:
eth0:
ipv4_gateways:
192.168.1.1:
subnets:
- 0.0.0.0/0
ipv6_gateways:
fe80::1:
subnets:
- ::/0
Interface Routes:
eth0:
ipv4_subnets:
- 192.168.1.0/24
ipv6_subnets:
- 2401:4900:1f29:3cec::/64
- fe80::/64

192.168.1.38 627
168980 - Enumerate the PATH Variables

Synopsis

Enumerates the PATH variable of the current scan user.

Description

Enumerates the PATH variables of the current scan user.

Solution

Ensure that directories listed here are in line with corporate policy.

Risk Factor

None

Plugin Information

Published: 2022/12/21, Modified: 2024/12/03

Plugin Output

tcp/0

Nessus has enumerated the path of the current scan user :

/usr/local/sbin
/usr/local/bin
/usr/sbin
/usr/bin
/sbin
/bin
/usr/games

192.168.1.38 628
35716 - Ethernet Card Manufacturer Detection

Synopsis

The manufacturer can be identified from the Ethernet OUI.

Description

Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.

See Also

https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/02/19, Modified: 2020/05/13

Plugin Output

tcp/0

The following card manufacturers were identified :

08:00:27:68:92:C1 : PCS Systemtechnik GmbH

192.168.1.38 629
86420 - Ethernet MAC Addresses

Synopsis

This plugin gathers MAC addresses from various sources and consolidates them into a list.

Description

This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and
Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single,
unique, and uniform list.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2015/10/16, Modified: 2020/05/13

Plugin Output

tcp/0

The following is a consolidated list of detected MAC addresses:


- 08:00:27:68:92:C1

192.168.1.38 630
10092 - FTP Server Detection

Synopsis

An FTP server is listening on a remote port.

Description

It is possible to obtain the banner of the remote FTP server by connecting to a remote port.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943

Plugin Information

Published: 1999/10/12, Modified: 2023/08/17

Plugin Output

tcp/21/ftp

The remote FTP banner is :

220 (vsFTPd 2.3.4)

192.168.1.38 631
10092 - FTP Server Detection

Synopsis

An FTP server is listening on a remote port.

Description

It is possible to obtain the banner of the remote FTP server by connecting to a remote port.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943

Plugin Information

Published: 1999/10/12, Modified: 2023/08/17

Plugin Output

tcp/2121/ftp

The remote FTP banner is :

220 ProFTPD 1.3.1 Server (Debian) [::ffff:192.168.1.38]

192.168.1.38 632
10107 - HTTP Server Type and Version

Synopsis

A web server is running on the remote host.

Description

This plugin attempts to determine the type and the version of the remote web server.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0931

Plugin Information

Published: 2000/01/04, Modified: 2020/10/30

Plugin Output

tcp/80/www

The remote web server type is :

Apache/2.2.8 (Ubuntu) DAV/2

192.168.1.38 633
10107 - HTTP Server Type and Version

Synopsis

A web server is running on the remote host.

Description

This plugin attempts to determine the type and the version of the remote web server.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0931

Plugin Information

Published: 2000/01/04, Modified: 2020/10/30

Plugin Output

tcp/8180/www

The remote web server type is :

Apache-Coyote/1.1

192.168.1.38 634
24260 - HyperText Transfer Protocol (HTTP) Information

Synopsis

Some information about the remote HTTP configuration can be extracted.

Description

This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-
Alive is enabled, etc...

This test is informational only and does not denote any security problem.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/01/30, Modified: 2024/02/26

Plugin Output

tcp/80/www

Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1


HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 05 Dec 2024 11:22:49 GMT


Server: Apache/2.2.8 (Ubuntu) DAV/2
X-Powered-By: PHP/5.2.4-2ubuntu5.10
Content-Length: 891
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

Response Body :

<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>

_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/

192.168.1.38 635
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|

Warning: Never expose this VM to an untrusted network!

Contact: msfdev[at]metasploit.com

Login with msfadmin/msfadmin to get started

</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>

192.168.1.38 636
24260 - HyperText Transfer Protocol (HTTP) Information

Synopsis

Some information about the remote HTTP configuration can be extracted.

Description

This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-
Alive is enabled, etc...

This test is informational only and does not denote any security problem.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/01/30, Modified: 2024/02/26

Plugin Output

tcp/8180/www

Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1


HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS
Headers :

Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Date: Thu, 05 Dec 2024 11:22:41 GMT
Connection: close

Response Body :

<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

192.168.1.38 637
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">


<head>
<title>Apache Tomcat/5.5</title>
<style type="text/css">
/*<![CDATA[*/
body {
color: #000000;
background-color: #FFFFFF;
font-family: Arial, "Times New Roman", Times, serif;
margin: 10px 0px;
}

img {
border: none;
}

a:link, a:visited {
color: blue
}

th {
font-family: Verdana, "Times New Roman", Times, serif;
font-size: 110%;
font-weight: normal;
font-style: italic;
background: #D2A41C;
text-align: left;
}

td {
color: #000000;
font-family: Arial, Helvetica, sans-serif;
}

td.men [...]

192.168.1.38 638
171410 - IP Assignment Method Detection

Synopsis

Enumerates the IP address assignment method(static/dynamic).

Description

Enumerates the IP address assignment method(static/dynamic).

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2023/02/14, Modified: 2024/12/03

Plugin Output

tcp/0

+ lo
+ IPv4
- Address : 127.0.0.1
Assign Method : static
+ IPv6
- Address : ::1
Assign Method : static
+ eth0
+ IPv4
- Address : 192.168.1.38
Assign Method : static
+ IPv6
- Address : 2401:4900:1f29:3cec:a00:27ff:fe68:92c1
Assign Method : dynamic
- Address : fe80::a00:27ff:fe68:92c1
Assign Method : static

192.168.1.38 639
11156 - IRC Daemon Version Detection

Synopsis

The remote host is an IRC server.

Description

This plugin determines the version of the IRC daemon.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/11/19, Modified: 2016/01/08

Plugin Output

tcp/6667/irc

The IRC server version is : Unreal3.2.8.1. FhiXOoE [*=2309]

192.168.1.38 640
157358 - Linux Mounted Devices

Synopsis

Use system commands to obtain the list of mounted devices on the target machine at scan time.

Description

Report the mounted devices information on the target machine at scan time using the following
commands.
/bin/df -h /bin/lsblk /bin/mount -l

This plugin only reports on the tools available on the system and omits any tool that did not return
information when the command was ran.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2022/02/03, Modified: 2023/11/27

Plugin Output

tcp/0

$ df -h
Filesystem Size Used Avail Use% Mounted on
/dev/mapper/metasploitable-root
7.0G 1.5G 5.2G 22% /
varrun 506M 156K 506M 1% /var/run
varlock 506M 0 506M 0% /var/lock
udev 506M 20K 506M 1% /dev
devshm 506M 0 506M 0% /dev/shm
/dev/sda1 228M 25M 192M 12% /boot

$ mount -l
/dev/mapper/metasploitable-root on / type ext3 (rw,relatime,errors=remount-ro) []
proc on /proc type proc (rw,noexec,nosuid,nodev)
/sys on /sys type sysfs (rw,noexec,nosuid,nodev)
varrun on /var/run type tmpfs (rw,noexec,nosuid,nodev,mode=0755)
varlock on /var/lock type tmpfs (rw,noexec,nosuid,nodev,mode=1777)
udev on /dev type tmpfs (rw,mode=0755)
devshm on /dev/shm type tmpfs (rw)
devpts on /dev/pts type devpts (rw,gid=5,mode=620)
/dev/sda1 on /boot type ext3 (rw,relatime) []
securityfs on /sys/kernel/security type securityfs (rw)
rpc_pipefs on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw)
nfsd on /proc/fs/nfsd type nfsd (rw)

192.168.1.38 641
192.168.1.38 642
193143 - Linux Time Zone Information

Synopsis

Nessus was able to collect and report time zone information from the remote host.

Description

Nessus was able to collect time zone information from the remote Linux host.

Solution

None

Risk Factor

None

Plugin Information

Published: 2024/04/10, Modified: 2024/04/10

Plugin Output

tcp/0

Via date: EST -0500


Via /etc/timezone: US/Eastern
Via /etc/localtime: EST5EDT,M3.2.0,M11.1.0

192.168.1.38 643
95928 - Linux User List Enumeration

Synopsis

Nessus was able to enumerate local users and groups on the remote Linux host.

Description

Using the supplied credentials, Nessus was able to enumerate the local users and groups on the remote
Linux host.

Solution

None

Risk Factor

None

Plugin Information

Published: 2016/12/19, Modified: 2024/11/26

Plugin Output

tcp/0

-----------[ User Accounts ]-----------

User : msfadmin
Home folder : /home/msfadmin
Start script : /bin/bash
Groups : dip
admin
lpadmin
dialout
msfadmin
fuse
video
cdrom
sambashare
adm
audio
plugdev
floppy

User : user
Home folder : /home/user
Start script : /bin/bash
Groups : user

User : service
Home folder : /home/service
Start script : /bin/bash
Groups : service

192.168.1.38 644
----------[ System Accounts ]----------

User : root
Home folder : /root
Start script : /bin/bash
Groups : root

User : daemon
Home folder : /usr/sbin
Start script : /bin/sh
Groups : daemon

User : bin
Home folder : /bin
Start script : /bin/sh
Groups : bin

User : sys
Home folder : /dev
Start script : /bin/sh
Groups : sys

User : sync
Home folder : /bin
Start script : /bin/sync
Groups : nogroup

User : games
Home folder : /usr/games
Start script : /bin/sh
Groups : games

User : man
Home folder : /var/cache/man
Start script : /bin/sh
Groups : man

User : lp
Home folder : /var/spool/lpd
Start script : /bin/sh
Groups : lp

User : mail
Home folder : /var/mail
Start script : /bin/sh
Groups : mail

User : news
Home folder : /var/spool/news
Start script : /bin/sh
Groups : news

User : uucp
Home folder : /var/spool/uucp
Start script : /bin/sh
Groups : uucp

User : proxy
Home folder : /bin
Start script : /bin/sh
Groups : proxy

User : www-data
Home folder : /var/www
Start script : /bin/sh
Groups : www-data

User : backup
Home folder : /var/backups
Start script : /bin/sh

192.168.1.38 645
Groups : backup

User : list
Home folder : /var/list
Start script : /bin/sh
Groups : list

User : irc
Home folder : /var/run/ircd
Start scr [...]

192.168.1.38 646
10397 - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure

Synopsis

It is possible to obtain network information.

Description

It was possible to obtain the browse list of the remote Windows system by sending a request to the
LANMAN pipe. The browse list is the list of the nearest Windows systems of the remote host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2000/05/09, Modified: 2022/02/01

Plugin Output

tcp/445/cifs

Here is the browse list of the remote host :

DESKTOP-1JOT8DL ( os : 0.0 )
METASPLOITABLE ( os : 0.0 )
WINDOWS ( os : 0.0 )

192.168.1.38 647
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure

Synopsis

It was possible to obtain information about the remote operating system.

Description

Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by
sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on
the host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/10/17, Modified: 2021/09/20

Plugin Output

tcp/445/cifs

The remote Operating System is : Unix


The remote native LAN manager is : Samba 3.0.20-Debian
The remote SMB Domain Name is : METASPLOITABLE

192.168.1.38 648
11011 - Microsoft Windows SMB Service Detection

Synopsis

A file / print sharing service is listening on the remote host.

Description

The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/06/05, Modified: 2021/02/11

Plugin Output

tcp/139/smb

An SMB server is running on this port.

192.168.1.38 649
11011 - Microsoft Windows SMB Service Detection

Synopsis

A file / print sharing service is listening on the remote host.

Description

The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/06/05, Modified: 2021/02/11

Plugin Output

tcp/445/cifs

A CIFS server is running on this port.

192.168.1.38 650
100871 - Microsoft Windows SMB Versions Supported (remote check)

Synopsis

It was possible to obtain information about the version of SMB running on the remote host.

Description

Nessus was able to obtain the version of SMB running on the remote host by sending an authentication
request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2017/06/19, Modified: 2019/11/22

Plugin Output

tcp/445/cifs

The remote host supports the following versions of SMB :


SMBv1

192.168.1.38 651
106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)

Synopsis

It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.

Description

Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an
authentication request to port 139 or 445.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2018/02/09, Modified: 2020/03/11

Plugin Output

tcp/445/cifs

The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
3.1.1 Windows 10

192.168.1.38 652
10719 - MySQL Server Detection

Synopsis

A database server is listening on the remote port.

Description

The remote host is running MySQL, an open source database server.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0802

Plugin Information

Published: 2001/08/13, Modified: 2022/10/12

Plugin Output

tcp/3306/mysql

Version : 5.0.51a-3ubuntu5
Protocol : 10
Server Status : SERVER_STATUS_AUTOCOMMIT
Server Capabilities :
CLIENT_LONG_FLAG (Get all column flags)
CLIENT_CONNECT_WITH_DB (One can specify db on connect)
CLIENT_COMPRESS (Can use compression protocol)
CLIENT_PROTOCOL_41 (New 4.1 protocol)
CLIENT_SSL (Switch to SSL after handshake)
CLIENT_TRANSACTIONS (Client knows about transactions)
CLIENT_SECURE_CONNECTION (New 4.1 authentication)

192.168.1.38 653
10437 - NFS Share Export List

Synopsis

The remote NFS server exports a list of shares.

Description

This plugin retrieves the list of NFS exported shares.

See Also

http://www.tldp.org/HOWTO/NFS-HOWTO/security.html

Solution

Ensure each share is intended to be exported.

Risk Factor

None

Plugin Information

Published: 2000/06/07, Modified: 2019/10/04

Plugin Output

tcp/2049/rpc-nfs

Here is the export list of 192.168.1.38 :

/ *

192.168.1.38 654
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/21/ftp

Port 21/tcp was found to be open

192.168.1.38 655
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/22/ssh

Port 22/tcp was found to be open

192.168.1.38 656
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/23/telnet

Port 23/tcp was found to be open

192.168.1.38 657
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/25/smtp

Port 25/tcp was found to be open

192.168.1.38 658
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/53/dns

Port 53/tcp was found to be open

192.168.1.38 659
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/80/www

Port 80/tcp was found to be open

192.168.1.38 660
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/111/rpc-portmapper

Port 111/tcp was found to be open

192.168.1.38 661
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/139/smb

Port 139/tcp was found to be open

192.168.1.38 662
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/445/cifs

Port 445/tcp was found to be open

192.168.1.38 663
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/512

Port 512/tcp was found to be open

192.168.1.38 664
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/513/rlogin

Port 513/tcp was found to be open

192.168.1.38 665
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/514/rsh

Port 514/tcp was found to be open

192.168.1.38 666
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/1099/rmi_registry

Port 1099/tcp was found to be open

192.168.1.38 667
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/1524/wild_shell

Port 1524/tcp was found to be open

192.168.1.38 668
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/2049/rpc-nfs

Port 2049/tcp was found to be open

192.168.1.38 669
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/2121/ftp

Port 2121/tcp was found to be open

192.168.1.38 670
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/3306/mysql

Port 3306/tcp was found to be open

192.168.1.38 671
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/3632

Port 3632/tcp was found to be open

192.168.1.38 672
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/5432/postgresql

Port 5432/tcp was found to be open

192.168.1.38 673
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/5900/vnc

Port 5900/tcp was found to be open

192.168.1.38 674
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/6000/x11

Port 6000/tcp was found to be open

192.168.1.38 675
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/6667/irc

Port 6667/tcp was found to be open

192.168.1.38 676
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/8009/ajp13

Port 8009/tcp was found to be open

192.168.1.38 677
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/8180/www

Port 8180/tcp was found to be open

192.168.1.38 678
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/8787

Port 8787/tcp was found to be open

192.168.1.38 679
19506 - Nessus Scan Information

Synopsis

This plugin displays information about the Nessus scan.

Description

This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.


- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2005/08/26, Modified: 2024/10/04

Plugin Output

tcp/0

Information about this scan :

Nessus version : 10.8.3


Nessus build : 20010
Plugin feed version : 202412050432
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : debian10-x86-64
Scan type : Normal
Scan name : Advanced Scan using Nessus

192.168.1.38 680
Scan policy used : Advanced Scan
Scanner IP : 192.168.1.34
Port scanner(s) : nessus_syn_scanner
Port range : default
Ping RTT : 215.265 ms
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : no
Credentialed checks : yes, as 'msfadmin' via ssh
Attempt Least Privilege : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : Detected
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2024/12/5 16:47 IST
Scan duration : 545 sec
Scan for malware : no

192.168.1.38 681
11936 - OS Identification

Synopsis

It is possible to guess the remote operating system.

Description

Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess
the name of the remote operating system in use. It is also possible sometimes to guess the version of the
operating system.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2003/12/09, Modified: 2024/10/14

Plugin Output

tcp/0

Remote operating system : Linux Kernel 2.6.24-16-server on Ubuntu 8.04


Confidence level : 100
Method : LinuxDistribution

Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.

SSH:SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
uname:Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux

SinFP:
P1:B10113:F0x12:W5840:O0204ffff:M1460:
P2:B10113:F0x12:W5792:O0204ffff0402080affffffff4445414401030306:M1460:
P3:B10120:F0x04:W0:O0:M0
P4:191003_7_p=22
SMTP:!:220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
SSLcert:!:i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple
Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple
Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/
CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6

192.168.1.38 682
The remote host is running Linux Kernel 2.6.24-16-server on Ubuntu 8.04

192.168.1.38 683
97993 - OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH
Library)

Synopsis

Information about the remote host can be disclosed via an authenticated session.

Description

Nessus was able to login to the remote host using SSH or local commands and extract the list of installed
packages.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2017/05/30, Modified: 2024/10/15

Plugin Output

tcp/0

It was possible to log into the remote host via SSH using 'password' authentication.

Local checks have been enabled for this host.


The remote Debian system is :
lenny/sid

This is a Ubuntu system

OS Security Patch Assessment is available for this host.


Note, though, that an attempt to elevate privileges using 'su+sudo' failed
for an unknown reason. Further commands will be run as the user
specified in the scan policy.

Runtime : 9.715520 seconds

192.168.1.38 684
117887 - OS Security Patch Assessment Available

Synopsis

Nessus was able to log in to the remote host using the provided credentials and enumerate OS security
patch levels.

Description

Nessus was able to determine OS security patch levels by logging into the remote host and running
commands to determine the version of the operating system and its components. The remote host was
identified as an operating system or device that Nessus supports for patch and update assessment. The
necessary information was obtained to perform these checks.

Solution

n/a

Risk Factor

None

References

XREF IAVB:0001-B-0516

Plugin Information

Published: 2018/10/02, Modified: 2021/07/12

Plugin Output

tcp/0

OS Security Patch Assessment is available.

Account : msfadmin
Protocol : SSH

192.168.1.38 685
181418 - OpenSSH Detection

Synopsis

An OpenSSH-based SSH server was detected on the remote host.

Description

An OpenSSH-based SSH server was detected on the remote host.

See Also

https://www.openssh.com/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2023/09/14, Modified: 2024/12/03

Plugin Output

tcp/22/ssh

Service : ssh
Version : 4.7p1
Banner : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1

192.168.1.38 686
50845 - OpenSSL Detection

Synopsis

The remote service appears to use OpenSSL to encrypt traffic.

Description

Based on its response to a TLS request with a specially crafted server name extension, it seems that the
remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS
extensions (RFC 4366).

See Also

https://www.openssl.org/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2010/11/30, Modified: 2020/06/12

Plugin Output

tcp/25/smtp

192.168.1.38 687
50845 - OpenSSL Detection

Synopsis

The remote service appears to use OpenSSL to encrypt traffic.

Description

Based on its response to a TLS request with a specially crafted server name extension, it seems that the
remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS
extensions (RFC 4366).

See Also

https://www.openssl.org/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2010/11/30, Modified: 2020/06/12

Plugin Output

tcp/5432/postgresql

192.168.1.38 688
168007 - OpenSSL Installed (Linux)

Synopsis

OpenSSL was detected on the remote Linux host.

Description

OpenSSL was detected on the remote Linux host.

The plugin timeout can be set to a custom value other than the plugin's default of 15 minutes via the
'timeout.168007' scanner setting in Nessus 8.15.1 or later.

Please see https://docs.tenable.com/nessus/Content/SettingsAdvanced.htm#Custom for more


information.

Note: This plugin leverages the '-maxdepth' find command option, which is a feature implemented by
the GNU find binary. If the target does not support this option, such as HP-UX and AIX devices, users will
need to enable 'thorough tests' in their scan policy to run the find command without using a '-maxdepth'
argument.

See Also

https://openssl.org/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2022/11/21, Modified: 2024/12/03

Plugin Output

tcp/0

Path : openssl 0.9.8g-4ubuntu3 (via package manager)


Version : 0.9.8g
Managed by OS : True

192.168.1.38 689
48243 - PHP Version Detection

Synopsis

It was possible to obtain the version number of the remote PHP installation.

Description

Nessus was able to determine the version of PHP available on the remote web server.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0936

Plugin Information

Published: 2010/08/04, Modified: 2024/11/22

Plugin Output

tcp/80/www

Nessus was able to identify the following PHP version information :

Version : 5.2.4-2ubuntu5.10
Source : X-Powered-By: PHP/5.2.4-2ubuntu5.10

192.168.1.38 690
66334 - Patch Report

Synopsis

The remote host is missing several patches.

Description

The remote host is missing one or more security patches. This plugin lists the newest version of each patch
to install to make sure the remote host is up-to-date.

Note: Because the 'Show missing patches that have been superseded' setting in your scan policy depends
on this plugin, it will always run and cannot be disabled.

Solution

Install the patches listed below.

Risk Factor

None

Plugin Information

Published: 2013/07/08, Modified: 2024/11/12

Plugin Output

tcp/0

. You need to take the following 69 actions :

[ ISC BIND 9.x < 9.11.22, 9.12.x < 9.16.6, 9.17.x < 9.17.4 DoS (139915) ]

+ Action to take : Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

+Impact : Taking this action will resolve 3 different vulnerabilities (CVEs).

[ Samba Badlock Vulnerability (90509) ]

+ Action to take : Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.

[ Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : pcre3 vulnerability (USN-624-1) (33504) ]

+ Action to take : Update the affected packages.

[ Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : linux, linux-source-2.6.15/22 vulnerabilities
(USN-679-1) (37683) ]

+ Action to take : Update the affected packages.

192.168.1.38 691
+Impact : Taking this action will resolve 15 different vulnerabilities (CVEs).

[ Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : shadow vulnerability (USN-695-1) (37654) ]

+ Action to take : Update the affected login and / or passwd packages.

+Impact : Taking this action will resolve 3 different vulnerabilities (CVEs).

[ Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : udev vulnerabilities (USN-758-1) (36530) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 2 different vulnerabilities (CVEs).

[ Ubuntu 6.06 LTS / 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : apache2, apr vulnerabilities (USN-1134-1)
(55095) ]

+ Action to take : Update the affected libapr0 and / or libapr1 packages.

+Impact : Taking this action will resolve 3 different vulnerabilities (CVEs).

[ Ubuntu 6.06 LTS / 8.04 LTS / 10.04 LTS / 10.10 / 11.04 : postfix vulnerability (USN-1131-1)
(55092) ]

+ Action to take : Update the affected postfix package.

+Impact : Taking this action will resolve 5 different vulnerabilities (CVEs).

[ Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : expat vulnerabilities (USN-890-1) (44108) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 3 different vulnerabilities (CVEs).

[ Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : gzip vulnerabil [...]

192.168.1.38 692
130024 - PostgreSQL Client/Server Installed (Linux)

Synopsis

One or more PostgreSQL server or client versions are available on the remote Linux host.

Description

One or more PostgreSQL server or client versions have been detected on the remote Linux host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2019/10/18, Modified: 2024/12/03

Plugin Output

tcp/0

Path : /usr/lib/postgresql/8.3/bin/postgres (via package manager)


Version : 8.3.1

tcp/0

Path : /usr/lib/postgresql/8.3/bin/psql (via package manager)


Version : 8.3.1

192.168.1.38 693
118224 - PostgreSQL STARTTLS Support

Synopsis

The remote service supports encrypting traffic.

Description

The remote PostgreSQL server supports the use of encryption initiated during pre-login to switch from a
cleartext to an encrypted communications channel.

See Also

https://www.postgresql.org/docs/9.2/protocol-flow.html#AEN96066
https://www.postgresql.org/docs/9.2/protocol-message-formats.html

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2018/10/19, Modified: 2022/04/11

Plugin Output

tcp/5432/postgresql

Here is the PostgreSQL's SSL certificate that Nessus


was able to collect after sending a pre-login packet :

------------------------------ snip ------------------------------


Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs

192.168.1.38 694
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

------------------------------ snip ------------ [...]

192.168.1.38 695
26024 - PostgreSQL Server Detection

Synopsis

A database service is listening on the remote host.

Description

The remote service is a PostgreSQL database server, or a derivative such as EnterpriseDB.

See Also

https://www.postgresql.org/

Solution

Limit incoming traffic to this port if desired.

Risk Factor

None

Plugin Information

Published: 2007/09/14, Modified: 2023/05/24

Plugin Output

tcp/5432/postgresql

192.168.1.38 696
22227 - RMI Registry Detection

Synopsis

An RMI registry is listening on the remote host.

Description

The remote host is running an RMI registry, which acts as a bootstrap naming service for registering and
retrieving remote objects with simple names in the Java Remote Method Invocation (RMI) system.

See Also

https://docs.oracle.com/javase/1.5.0/docs/guide/rmi/spec/rmiTOC.html
http://www.nessus.org/u?b6fd7659

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2006/08/16, Modified: 2022/06/01

Plugin Output

tcp/1099/rmi_registry
tcp/1099/rmi_registry

Valid response recieved for port 1099:


0x00: 51 AC ED 00 05 77 0F 01 1A 61 AD 63 00 00 01 93 Q....w...a.c....
0x10: 96 8F 8B C8 80 02 75 72 00 13 5B 4C 6A 61 76 61 ......ur..[Ljava
0x20: 2E 6C 61 6E 67 2E 53 74 72 69 6E 67 3B AD D2 56 .lang.String;..V
0x30: E7 E9 1D 7B 47 02 00 00 70 78 70 00 00 00 00 ...{G...pxp....

192.168.1.38 697
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

tcp/111/rpc-portmapper

The following RPC services are available on TCP port 111 :

- program: 100000 (portmapper), version: 2

192.168.1.38 698
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

udp/111/rpc-portmapper

The following RPC services are available on UDP port 111 :

- program: 100000 (portmapper), version: 2

192.168.1.38 699
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

tcp/2049/rpc-nfs

The following RPC services are available on TCP port 2049 :

- program: 100003 (nfs), version: 2


- program: 100003 (nfs), version: 3
- program: 100003 (nfs), version: 4

192.168.1.38 700
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

udp/2049/rpc-nfs

The following RPC services are available on UDP port 2049 :

- program: 100003 (nfs), version: 2


- program: 100003 (nfs), version: 3
- program: 100003 (nfs), version: 4

192.168.1.38 701
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

udp/33457/rpc-status

The following RPC services are available on UDP port 33457 :

- program: 100024 (status), version: 1

192.168.1.38 702
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

tcp/45109/rpc-nlockmgr

The following RPC services are available on TCP port 45109 :

- program: 100021 (nlockmgr), version: 1


- program: 100021 (nlockmgr), version: 3
- program: 100021 (nlockmgr), version: 4

192.168.1.38 703
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

tcp/46815/rpc-mountd

The following RPC services are available on TCP port 46815 :

- program: 100005 (mountd), version: 1


- program: 100005 (mountd), version: 2
- program: 100005 (mountd), version: 3

192.168.1.38 704
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

udp/47167/rpc-nlockmgr

The following RPC services are available on UDP port 47167 :

- program: 100021 (nlockmgr), version: 1


- program: 100021 (nlockmgr), version: 3
- program: 100021 (nlockmgr), version: 4

192.168.1.38 705
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

tcp/48401/rpc-status

The following RPC services are available on TCP port 48401 :

- program: 100024 (status), version: 1

192.168.1.38 706
11111 - RPC Services Enumeration

Synopsis

An ONC RPC service is running on the remote host.

Description

By sending a DUMP request to the portmapper, it was possible to enumerate the ONC RPC services
running on the remote port. Using this information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/08/24, Modified: 2011/05/24

Plugin Output

udp/48762/rpc-mountd

The following RPC services are available on UDP port 48762 :

- program: 100005 (mountd), version: 1


- program: 100005 (mountd), version: 2
- program: 100005 (mountd), version: 3

192.168.1.38 707
53335 - RPC portmapper (TCP)

Synopsis

An ONC RPC portmapper is running on the remote host.

Description

The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/04/08, Modified: 2011/08/29

Plugin Output

tcp/111/rpc-portmapper

192.168.1.38 708
10223 - RPC portmapper Service Detection

Synopsis

An ONC RPC portmapper is running on the remote host.

Description

The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host
by sending either multiple lookup requests or a DUMP request.

Solution

n/a

Risk Factor

None

CVSS v3.0 Base Score

0.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)

CVSS v2.0 Base Score

0.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:N)

References

CVE CVE-1999-0632

Plugin Information

Published: 1999/08/19, Modified: 2019/10/04

Plugin Output

udp/111/rpc-portmapper

192.168.1.38 709
45405 - Reachable IPv6 address

Synopsis

The remote host may be reachable from the Internet.

Description

Although this host was scanned through a private IPv4 or local scope IPv6 address, some network
interfaces are configured with global scope IPv6 addresses. Depending on the configuration of the firewalls
and routers, this host may be reachable from Internet.

Solution

Disable IPv6 if you do not actually using it.

Otherwise, disable any unused IPv6 interfaces and implement IP filtering if needed.

Risk Factor

None

Plugin Information

Published: 2010/04/02, Modified: 2024/07/24

Plugin Output

tcp/0

The following global address was gathered :

- 2401:4900:1f29:3cec:a00:27ff:fe68:92c1

192.168.1.38 710
202184 - Ruby Programming Language Installed (Linux)

Synopsis

The Ruby programming language is installed on the remote Linux host.

Description

The Ruby programming language is installed on the remote Linux host.

See Also

https://ruby.org/en/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2024/07/11, Modified: 2024/12/03

Plugin Output

tcp/0

Path : package: ruby1.8


1.8.6.111-2ubuntu1.3
Version : 1.8.6.111
Managed by OS : True

192.168.1.38 711
10263 - SMTP Server Detection

Synopsis

An SMTP server is listening on the remote port.

Description

The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.

Solution

Disable this service if you do not use it, or filter incoming traffic to this port.

Risk Factor

None

References

XREF IAVT:0001-T-0932

Plugin Information

Published: 1999/10/12, Modified: 2020/09/22

Plugin Output

tcp/25/smtp

Remote SMTP server banner :

220 metasploitable.localdomain ESMTP Postfix (Ubuntu)

192.168.1.38 712
42088 - SMTP Service STARTTLS Command Support

Synopsis

The remote mail service supports encrypting traffic.

Description

The remote SMTP service supports the use of the 'STARTTLS' command to switch from a cleartext to an
encrypted communications channel.

See Also

https://en.wikipedia.org/wiki/STARTTLS
https://tools.ietf.org/html/rfc2487

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/10/09, Modified: 2019/03/20

Plugin Output

tcp/25/smtp

Here is the SMTP service's SSL certificate that Nessus was able to
collect after sending a 'STARTTLS' command :

------------------------------ snip ------------------------------


Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs

192.168.1.38 713
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption


Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

------------------------------ snip --------- [...]

192.168.1.38 714
70657 - SSH Algorithms and Languages Supported

Synopsis

An SSH server is listening on this port.

Description

This script detects which algorithms and languages are supported by the remote service for encrypting
communications.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2013/10/28, Modified: 2024/12/03

Plugin Output

tcp/22/ssh

Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1

The server supports the following options for server_host_key_algorithms :

ssh-dss
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
[email protected]

192.168.1.38 715
The server supports the following options for encryption_algorithms_server_to_client :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
[email protected]

The server supports the following options for mac_algorithms_client_to_server :

hmac-md5
hmac-md5-96
hmac-ripemd160
[email protected]
hmac-sha1
hmac-sha1-96
[email protected]

The server supports the following options for mac_algorithms_server_to_client :

hmac-md5
hmac-md5-96
hmac-ripemd160
[email protected]
hmac-sha1
hmac-sha1-96
[email protected]

The server supports the following options for compression_algorithms_client_to_server :

none
[email protected]

The server supports the following options for compression_algorithms_server_to_client :

none
[email protected]

192.168.1.38 716
102094 - SSH Commands Require Privilege Escalation

Synopsis

This plugin reports the SSH commands that failed with a response indicating that privilege escalation is
required to run them.

Description

This plugin reports the SSH commands that failed with a response indicating that privilege escalation is
required to run them. Either privilege escalation credentials were not provided, or the command failed to
run with the provided privilege escalation credentials.

NOTE: Due to limitations inherent to the majority of SSH servers, this plugin may falsely report failures for
commands containing error output expected by sudo, such as 'incorrect password', 'not in the sudoers file',
or 'not allowed to execute'.

Solution

n/a

Risk Factor

None

References

XREF IAVB:0001-B-0507

Plugin Information

Published: 2017/08/01, Modified: 2020/09/22

Plugin Output

tcp/0

Login account : msfadmin


Commands failed due to lack of privilege escalation :
- Escalation account : (none)
Escalation method : (none)
Plugins :
- Plugin Filename : bios_get_info_ssh.nasl
Plugin ID : 34098
Plugin Name : BIOS Info (SSH)
- Command : "LC_ALL=C dmidecode"
Response : "# dmidecode 2.9"
Error : "/dev/mem: Permission denied"
- Command : "LC_ALL=C /usr/sbin/dmidecode"
Response : "# dmidecode 2.9"
Error : "/dev/mem: Permission denied"
- Plugin Filename : enumerate_aws_ami_nix.nasl
Plugin ID : 90191

192.168.1.38 717
Plugin Name : Amazon Web Services EC2 Instance Metadata Enumeration (Unix)
- Command : "/usr/sbin/dmidecode -s system-version 2>&1"
Response : "/dev/mem: Permission denied"
Error : ""
- Plugin Filename : enumerate_oci_nix.nasl
Plugin ID : 154138
Plugin Name : Oracle Cloud Infrastructure Instance Metadata Enumeration (Linux / Unix)
- Command : "LC_ALL=C dmidecode -s chassis-asset-tag 2>&1"
Response : "/dev/mem: Permission denied"
Error : ""
- Command : "LC_ALL=C /usr/sbin/dmidecode -s chassis-asset-tag 2>&1"
Response : "/dev/mem: Permission denied"
Error : ""
- Plugin Filename : host_tag_nix.nbin
Plugin ID : 87414
Plugin Name : Host Tagging (Linux)
- Command : "sh -c \"echo 2c985e1f4e36471e81c9858cf21657cd > /etc/tenable_tag && echo OK\""
Response : null
Error : "sh: /etc/tenable_tag: Permission denied"
- Plugin Filename : localusers_pwexpiry.nasl
Plugin ID : 83303
Plugin Name : Unix / Linux - Local Users Information : Passwords Never Expire
- Command : "cat /etc/shadow"
Response : null
Error : "cat: /etc/shadow: Permission denied"
- Plugin Filename : ssh_get_info2.nasl
Plugin ID : 97993
Plugin Name : OS Identification and Installed Software Enumeration over SSH v2 (Using New
SSH Library)
- Command : "lsmod | grep -q iptable_filter && iptables -L [...]

192.168.1.38 718
149334 - SSH Password Authentication Accepted

Synopsis

The SSH server on the remote host accepts password authentication.

Description

The SSH server on the remote host accepts password authentication.

See Also

https://tools.ietf.org/html/rfc4252#section-8

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2021/05/07, Modified: 2021/05/07

Plugin Output

tcp/22/ssh

192.168.1.38 719
10881 - SSH Protocol Versions Supported

Synopsis

A SSH server is running on the remote host.

Description

This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/03/06, Modified: 2024/07/24

Plugin Output

tcp/22/ssh

The remote SSH daemon supports the following versions of the


SSH protocol :

- 1.99
- 2.0

192.168.1.38 720
90707 - SSH SCP Protocol Detection

Synopsis

The remote host supports the SCP protocol over SSH.

Description

The remote host supports the Secure Copy (SCP) protocol over SSH.

See Also

https://en.wikipedia.org/wiki/Secure_copy

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2016/04/26, Modified: 2024/07/24

Plugin Output

tcp/22/ssh

192.168.1.38 721
153588 - SSH SHA-1 HMAC Algorithms Enabled

Synopsis

The remote SSH server is configured to enable SHA-1 HMAC algorithms.

Description

The remote SSH server is configured to enable SHA-1 HMAC algorithms.

Although NIST has formally deprecated use of SHA-1 for digital signatures, SHA-1 is still considered
secure for HMAC as the security of HMAC does not rely on the underlying hash function being resistant to
collisions.

Note that this plugin only checks for the options of the remote SSH server.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2021/09/23, Modified: 2022/04/05

Plugin Output

tcp/22/ssh

The following client-to-server SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are
supported :

hmac-sha1
hmac-sha1-96

The following server-to-client SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are
supported :

hmac-sha1
hmac-sha1-96

192.168.1.38 722
10267 - SSH Server Type and Version Information

Synopsis

An SSH server is listening on this port.

Description

It is possible to obtain information about the remote SSH server by sending an empty authentication
request.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0933

Plugin Information

Published: 1999/10/12, Modified: 2024/07/24

Plugin Output

tcp/22/ssh

SSH version : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1


SSH supported authentication : publickey,password

192.168.1.38 723
56984 - SSL / TLS Versions Supported

Synopsis

The remote service encrypts communications.

Description

This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/12/01, Modified: 2023/07/10

Plugin Output

tcp/25/smtp

This port supports SSLv2/SSLv3/TLSv1.0.

192.168.1.38 724
56984 - SSL / TLS Versions Supported

Synopsis

The remote service encrypts communications.

Description

This plugin detects which SSL and TLS versions are supported by the remote service for encrypting
communications.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/12/01, Modified: 2023/07/10

Plugin Output

tcp/5432/postgresql

This port supports SSLv3/TLSv1.0.

192.168.1.38 725
45410 - SSL Certificate 'commonName' Mismatch

Synopsis

The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.

Description

The service running on the remote host presents an SSL certificate for which the 'commonName' (CN)
attribute does not match the hostname on which the service listens.

Solution

If the machine has several names, make sure that users connect to the service through the DNS hostname
that matches the common name in the certificate.

Risk Factor

None

Plugin Information

Published: 2010/04/03, Modified: 2021/03/09

Plugin Output

tcp/25/smtp

The host name known by Nessus is :

metasploitable

The Common Name in the certificate is :

ubuntu804-base.localdomain

192.168.1.38 726
45410 - SSL Certificate 'commonName' Mismatch

Synopsis

The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.

Description

The service running on the remote host presents an SSL certificate for which the 'commonName' (CN)
attribute does not match the hostname on which the service listens.

Solution

If the machine has several names, make sure that users connect to the service through the DNS hostname
that matches the common name in the certificate.

Risk Factor

None

Plugin Information

Published: 2010/04/03, Modified: 2021/03/09

Plugin Output

tcp/5432/postgresql

The host name known by Nessus is :

metasploitable

The Common Name in the certificate is :

ubuntu804-base.localdomain

192.168.1.38 727
10863 - SSL Certificate Information

Synopsis

This plugin displays the SSL certificate.

Description

This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2008/05/19, Modified: 2021/02/03

Plugin Output

tcp/25/smtp

Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption

192.168.1.38 728
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

Fingerprints :

SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]

192.168.1.38 729
10863 - SSL Certificate Information

Synopsis

This plugin displays the SSL certificate.

Description

This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2008/05/19, Modified: 2021/02/03

Plugin Output

tcp/5432/postgresql

Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: [email protected]

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT


Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption

192.168.1.38 730
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits


Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

Fingerprints :

SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D [...]

192.168.1.38 731
70544 - SSL Cipher Block Chaining Cipher Suites Supported

Synopsis

The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks
with subsequent ones.

Description

The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2013/10/22, Modified: 2021/02/03

Plugin Output

tcp/25/smtp

Here is the list of SSL CBC ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1

192.168.1.38 732
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ------- [...]

192.168.1.38 733
70544 - SSL Cipher Block Chaining Cipher Suites Supported

Synopsis

The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks
with subsequent ones.

Description

The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These
cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak
information if used improperly.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
http://www.nessus.org/u?cc4a822a
https://www.openssl.org/~bodo/tls-cbc.txt

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2013/10/22, Modified: 2021/02/03

Plugin Output

tcp/5432/postgresql

Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1

192.168.1.38 734
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 735
21643 - SSL Cipher Suites Supported

Synopsis

The remote service encrypts communications using SSL.

Description

This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.

See Also

https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2006/06/05, Modified: 2024/09/11

Plugin Output

tcp/25/smtp

Here is the list of SSL ciphers supported by the remote server :


Each group is reported per SSL Version.

SSL Version : TLSv1


Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export

192.168.1.38 736
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth [...]

192.168.1.38 737
21643 - SSL Cipher Suites Supported

Synopsis

The remote service encrypts communications using SSL.

Description

This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.

See Also

https://www.openssl.org/docs/man1.0.2/man1/ciphers.html
http://www.nessus.org/u?e17ffced

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2006/06/05, Modified: 2024/09/11

Plugin Output

tcp/5432/postgresql

Here is the list of SSL ciphers supported by the remote server :


Each group is reported per SSL Version.

SSL Version : TLSv1


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1

192.168.1.38 738
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

SSL Version : SSLv3


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- [...]

192.168.1.38 739
62563 - SSL Compression Methods Supported

Synopsis

The remote service supports one or more compression methods for SSL connections.

Description

This script detects which compression methods are supported by the remote service for SSL connections.

See Also

http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
https://tools.ietf.org/html/rfc3749
https://tools.ietf.org/html/rfc3943
https://tools.ietf.org/html/rfc5246

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2012/10/16, Modified: 2022/04/11

Plugin Output

tcp/25/smtp

Nessus was able to confirm that the following compression method is


supported by the target :

DEFLATE (0x01)

192.168.1.38 740
62563 - SSL Compression Methods Supported

Synopsis

The remote service supports one or more compression methods for SSL connections.

Description

This script detects which compression methods are supported by the remote service for SSL connections.

See Also

http://www.iana.org/assignments/comp-meth-ids/comp-meth-ids.xml
https://tools.ietf.org/html/rfc3749
https://tools.ietf.org/html/rfc3943
https://tools.ietf.org/html/rfc5246

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2012/10/16, Modified: 2022/04/11

Plugin Output

tcp/5432/postgresql

Nessus was able to confirm that the following compression method is


supported by the target :

DEFLATE (0x01)

192.168.1.38 741
57041 - SSL Perfect Forward Secrecy Cipher Suites Supported

Synopsis

The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.

Description

The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/12/07, Modified: 2021/03/09

Plugin Output

tcp/25/smtp

Here is the list of SSL PFS ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1

192.168.1.38 742
High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 743
57041 - SSL Perfect Forward Secrecy Cipher Suites Supported

Synopsis

The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality
even if the key is stolen.

Description

The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These
cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is
compromised.

See Also

https://www.openssl.org/docs/manmaster/man1/ciphers.html
https://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange
https://en.wikipedia.org/wiki/Perfect_forward_secrecy

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/12/07, Modified: 2021/03/09

Plugin Output

tcp/5432/postgresql

Here is the list of SSL PFS ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1

192.168.1.38 744
The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 745
51891 - SSL Session Resume Supported

Synopsis

The remote host allows resuming SSL sessions.

Description

This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to
receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the
session ID in the second connection, the server maintains a cache of sessions that can be resumed.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/02/07, Modified: 2021/09/13

Plugin Output

tcp/25/smtp

This port supports resuming SSLv3 sessions.

192.168.1.38 746
156899 - SSL/TLS Recommended Cipher Suites

Synopsis

The remote host advertises discouraged SSL/TLS ciphers.

Description

The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to
only enable support for the following cipher suites:

TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256

TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305

This is the recommended configuration for the vast majority of services, as it is highly secure and
compatible with nearly every client released in the last five (or more) years.

See Also

https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/

Solution

Only enable support for recommened cipher suites.

Risk Factor

None

Plugin Information

Published: 2022/01/20, Modified: 2024/02/12

Plugin Output

tcp/25/smtp

192.168.1.38 747
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5
export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40)
SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56)
SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40)
SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5
export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56)
SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40)
SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5
export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5
export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56)
SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
ADH-DE [...]

192.168.1.38 748
156899 - SSL/TLS Recommended Cipher Suites

Synopsis

The remote host advertises discouraged SSL/TLS ciphers.

Description

The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to
only enable support for the following cipher suites:

TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256

TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305

This is the recommended configuration for the vast majority of services, as it is highly secure and
compatible with nearly every client released in the last five (or more) years.

See Also

https://wiki.mozilla.org/Security/Server_Side_TLS
https://ssl-config.mozilla.org/

Solution

Only enable support for recommened cipher suites.

Risk Factor

None

Plugin Information

Published: 2022/01/20, Modified: 2024/02/12

Plugin Output

tcp/5432/postgresql

192.168.1.38 749
The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined
below:

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168)
SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168)
SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC


---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128)
SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256)
SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128)
SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256)
SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128)
SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

192.168.1.38 750
25240 - Samba Server Detection

Synopsis

An SMB server is running on the remote host.

Description

The remote host is running Samba, a CIFS/SMB server for Linux and Unix.

See Also

https://www.samba.org/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/05/16, Modified: 2022/10/12

Plugin Output

tcp/445/cifs

192.168.1.38 751
104887 - Samba Version

Synopsis

It was possible to obtain the samba version from the remote operating system.

Description

Nessus was able to obtain the samba version from the remote operating by sending an authentication
request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2017/11/30, Modified: 2019/11/22

Plugin Output

tcp/445/cifs

The remote Samba Version is : Samba 3.0.20-Debian

192.168.1.38 752
96982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)

Synopsis

The remote Windows host supports the SMBv1 protocol.

Description

The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft
recommends that users discontinue the use of SMBv1 due to the lack of security features that were
included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that
affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-
CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.

See Also

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-
smbv3-in-windows-and
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3

Solution

Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB
directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block
TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.

Risk Factor

None

References

XREF IAVT:0001-T-0710

Plugin Information

Published: 2017/02/03, Modified: 2020/09/22

Plugin Output

tcp/445/cifs

The remote host supports SMBv1.

192.168.1.38 753
192.168.1.38 754
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/21/ftp

An FTP server is running on this port.

192.168.1.38 755
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/22/ssh

An SSH server is running on this port.

192.168.1.38 756
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/23/telnet

A telnet server is running on this port.

192.168.1.38 757
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/25/smtp

An SMTP server is running on this port.

192.168.1.38 758
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/1524/wild_shell

A shell server (Metasploitable) is running on this port.

192.168.1.38 759
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/2121/ftp

An FTP server is running on this port.

192.168.1.38 760
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/5900/vnc

A vnc server is running on this port.

192.168.1.38 761
22964 - Service Detection

Synopsis

The remote service could be identified.

Description

Nessus was able to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/08/19, Modified: 2024/03/26

Plugin Output

tcp/8180/www

A web server is running on this port.

192.168.1.38 762
17975 - Service Detection (GET request)

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives an HTTP request.

Solution

n/a

Risk Factor

None

References

XREF IAVT:0001-T-0935

Plugin Information

Published: 2005/04/06, Modified: 2021/10/27

Plugin Output

tcp/6667/irc

An IRC daemon is listening on this port.

192.168.1.38 763
11153 - Service Detection (HELP Request)

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives a 'HELP'
request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/11/18, Modified: 2024/11/19

Plugin Output

tcp/80/www

A web server seems to be running on this port.

192.168.1.38 764
11153 - Service Detection (HELP Request)

Synopsis

The remote service could be identified.

Description

It was possible to identify the remote service by its banner or by looking at the error message it sends
when it receives a 'HELP'
request.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/11/18, Modified: 2024/11/19

Plugin Output

tcp/3306/mysql

A MySQL server is running on this port.

192.168.1.38 765
22869 - Software Enumeration (SSH)

Synopsis

It was possible to enumerate installed software on the remote host via SSH.

Description

Nessus was able to list the software installed on the remote host by calling the appropriate command (e.g.,
'rpm -qa' on RPM-based Linux distributions, qpkg, dpkg, etc.).

Solution

Remove any software that is not in compliance with your organization's acceptable use and security
policies.

Risk Factor

None

References

XREF IAVT:0001-T-0502

Plugin Information

Published: 2006/10/15, Modified: 2022/09/06

Plugin Output

tcp/0

Here is the list of packages installed on the remote Debian Linux system :

Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Installed/Config-f/Unpacked/Failed-cfg/Half-inst/t-aWait/T-pend
|/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad)
||/ Name
Version
Description
+++-
==============================================================================================-
==============================================================================================-
==================================================================================================================
ii adduser
3.105ubuntu1 add
and remove users and groups
ii ant
1.7.0-3 Java
based build tool like make
ii antlr
2.7.6-10
language tool for constructing recognizers, compilers etc

192.168.1.38 766
ii apache2
2.2.8-1 Next
generation, scalable, extendable web server
ii apache2-mpm-prefork
2.2.8-1ubuntu0.15
Tradit [...]

192.168.1.38 767
25220 - TCP/IP Timestamps Supported

Synopsis

The remote service implements TCP timestamps.

Description

The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that
the uptime of the remote host can sometimes be computed.

See Also

http://www.ietf.org/rfc/rfc1323.txt

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/05/16, Modified: 2023/10/17

Plugin Output

tcp/0

192.168.1.38 768
11819 - TFTP Daemon Detection

Synopsis

A TFTP server is listening on the remote port.

Description

The remote host is running a TFTP (Trivial File Transfer Protocol) daemon. TFTP is often used by routers and
diskless hosts to retrieve their configuration. It can also be used by worms to propagate.

Solution

Disable this service if you do not use it.

Risk Factor

None

Plugin Information

Published: 2003/08/13, Modified: 2022/12/28

Plugin Output

udp/69/tftp

192.168.1.38 769
110385 - Target Credential Issues by Authentication Protocol - Insufficient Privilege

Synopsis

Nessus was able to log in to the remote host using the provided credentials. The provided credentials were
not sufficient to complete all requested checks.

Description

Nessus was able to execute credentialed checks because it was possible to log in to the remote host using
provided credentials, however the credentials were not sufficiently privileged to complete all requested
checks.

Solution

n/a

Risk Factor

None

References

XREF IAVB:0001-B-0502

Plugin Information

Published: 2018/06/06, Modified: 2024/03/25

Plugin Output

tcp/22/ssh

Nessus was able to log into the remote host, however this credential
did not have sufficient privileges for all planned checks :

User: 'msfadmin'
Port: 22
Proto: SSH
Method: password

See the output of the following plugin for details :

Plugin ID : 102094
Plugin Name : SSH Commands Require Privilege Escalation

192.168.1.38 770
141118 - Target Credential Status by Authentication Protocol - Valid Credentials Provided

Synopsis

Valid credentials were provided for an available authentication protocol.

Description

Nessus was able to determine that valid credentials were provided for an authentication protocol available
on the remote target because it was able to successfully authenticate directly to the remote target using
that authentication protocol at least once. Authentication was successful because the authentication
protocol service was available remotely, the service was able to be identified, the authentication protocol
was able to be negotiated successfully, and a set of credentials provided in the scan policy for that
authentication protocol was accepted by the remote service. See plugin output for details, including
protocol, port, and account.

Please note the following :

- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and
not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were
provided for an available SNMP service.

- Providing valid credentials for all available authentication protocols may improve scan coverage, but the
value of successful authentication for a given protocol may vary from target to target depending upon what
data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is
more valuable for Windows targets than for Linux targets.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2020/10/15, Modified: 2024/03/25

Plugin Output

tcp/22/ssh

Nessus was able to log in to the remote host via the following :

User: 'msfadmin'
Port: 22
Proto: SSH
Method: password

192.168.1.38 771
10281 - Telnet Server Detection

Synopsis

A Telnet server is listening on the remote port.

Description

The remote host is running a Telnet server, a remote terminal server.

Solution

Disable this service if you do not use it.

Risk Factor

None

Plugin Information

Published: 1999/10/12, Modified: 2020/06/12

Plugin Output

tcp/23/telnet

Here is the banner from the remote Telnet server :

------------------------------ snip ------------------------------


_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|
Warning: Never expose this VM to an untrusted network!
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
metasploitable login:
------------------------------ snip ------------------------------

192.168.1.38 772
56468 - Time of Last System Startup

Synopsis

The system has been started.

Description

Using the supplied credentials, Nessus was able to determine when the host was last started.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/10/12, Modified: 2018/06/19

Plugin Output

tcp/0

reboot system boot 2.6.24-16-server Thu Dec 5 05:52 - 06:25 (00:32)


reboot system boot 2.6.24-16-server Thu Dec 5 02:57 - 06:25 (03:27)
reboot system boot 2.6.24-16-server Wed Dec 4 03:02 - 06:25 (1+03:22)
reboot system boot 2.6.24-16-server Tue Dec 3 02:48 - 06:25 (2+03:36)

wtmp begins Tue Dec 3 02:48:11 2024

192.168.1.38 773
10287 - Traceroute Information

Synopsis

It was possible to obtain traceroute information.

Description

Makes a traceroute to the remote host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/11/27, Modified: 2023/12/04

Plugin Output

udp/0

For your information, here is the traceroute from 192.168.1.34 to 192.168.1.38 :


192.168.1.34
192.168.1.38

Hop Count: 1

192.168.1.38 774
198218 - Ubuntu Pro Subscription Detection

Synopsis

The remote Ubuntu host has an active Ubuntu Pro subscription.

Description

The remote Ubuntu host has an active Ubuntu Pro subscription.

See Also

https://documentation.ubuntu.com/pro/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2024/05/31, Modified: 2024/07/05

Plugin Output

tcp/0

This machine is NOT attached to an Ubuntu Pro subscription. However, it may have previously been
attached.

The following details were gathered from /var/lib/ubuntu-advantage/status.json:

192.168.1.38 775
110483 - Unix / Linux Running Processes Information

Synopsis

Uses /bin/ps auxww command to obtain the list of running processes on the target machine at scan time.

Description

Generated report details the running processes on the target machine at scan time.
This plugin is informative only and could be used for forensic investigation, malware detection, and to
confirm that your system processes conform to your system policies.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2018/06/12, Modified: 2023/11/27

Plugin Output

tcp/0

USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 1 0.0 0.1 2844 1692 ? Ss 05:52 0:01 /sbin/init
root 2 0.0 0.0 0 0 ? S< 05:52 0:00 [kthreadd]
root 3 0.0 0.0 0 0 ? S< 05:52 0:00 [migration/0]
root 4 0.0 0.0 0 0 ? S< 05:52 0:00 [ksoftirqd/0]
root 5 0.0 0.0 0 0 ? S< 05:52 0:00 [watchdog/0]
root 6 0.0 0.0 0 0 ? S< 05:52 0:00 [migration/1]
root 7 0.0 0.0 0 0 ? S< 05:52 0:00 [ksoftirqd/1]
root 8 0.0 0.0 0 0 ? S< 05:52 0:00 [watchdog/1]
root 9 0.0 0.0 0 0 ? S< 05:52 0:00 [events/0]
root 10 0.0 0.0 0 0 ? S< 05:52 0:00 [events/1]
root 11 0.0 0.0 0 0 ? S< 05:52 0:00 [khelper]
root 46 0.0 0.0 0 0 ? S< 05:52 0:00 [kblockd/0]
root 47 0.0 0.0 0 0 ? S< 05:52 0:00 [kblockd/1]
root 50 0.0 0.0 0 0 ? S< 05:52 0:00 [kacpid]
root 51 0.0 0.0 0 0 ? S< 05:52 0:00 [kacpi_notify]
root 98 0.0 0.0 0 0 ? S< 05:52 0:00 [kseriod]
root 140 0.0 0.0 0 0 ? S 05:52 0:00 [pdflush]
root 141 0.0 0.0 0 0 ? S 05:52 0:00 [pdflush]
root 142 0.0 0.0 0 0 ? S< 05:52 0:00 [kswapd0]
root 184 0.0 0.0 0 0 ? S< 05:52 0:00 [aio/0]
root 185 0.0 0.0 0 0 ? S< 05:52 0:00 [aio/1]
root 1152 0.0 0.0 0 0 ? S< 05:52 0:00 [ksnapd]
root 1304 0.0 0.0 0 0 ? S< 05:52 0:00 [ata/0]
root 1307 0.0 0.0 0 0 ? S< 05:52 0:00 [ata/1]
root 1310 0.0 0.0 0 0 ? S< 05:52 0:00 [ata_aux]
root 1319 0.0 0.0 0 0 ? S< 05:52 0:00 [scsi_eh_0] [...]

192.168.1.38 776
152742 - Unix Software Discovery Commands Available

Synopsis

Nessus was able to log in to the remote host using the provided credentials and is able to execute all
commands used to find unmanaged software.

Description

Nessus was able to determine that it is possible for plugins to find and identify versions of software on
the target host. Software that is not managed by the operating system is typically found and characterized
using these commands. This was measured by running commands used by unmanaged software plugins
and validating their output against expected results.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2021/08/23, Modified: 2021/08/23

Plugin Output

tcp/0

Unix software discovery checks are available.

Account : msfadmin
Protocol : SSH

192.168.1.38 777
11154 - Unknown Service Detection: Banner Retrieval

Synopsis

There is an unknown service running on the remote host.

Description

Nessus was unable to identify a service on the remote host even though it returned a banner of some type.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/11/18, Modified: 2022/07/26

Plugin Output

tcp/512

If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to [email protected] :

Port : 512
Type : spontaneous
Banner :
0x00: 01 57 68 65 72 65 20 61 72 65 20 79 6F 75 3F 0A .Where are you?.
0x10:

192.168.1.38 778
11154 - Unknown Service Detection: Banner Retrieval

Synopsis

There is an unknown service running on the remote host.

Description

Nessus was unable to identify a service on the remote host even though it returned a banner of some type.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/11/18, Modified: 2022/07/26

Plugin Output

tcp/8787

If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to [email protected] :

Port : 8787
Type : get_http
Banner :
0x0000: 00 00 00 03 04 08 46 00 00 03 A1 04 08 6F 3A 16 ......F......o:.
0x0010: 44 52 62 3A 3A 44 52 62 43 6F 6E 6E 45 72 72 6F DRb::DRbConnErro
0x0020: 72 07 3A 07 62 74 5B 17 22 2F 2F 75 73 72 2F 6C r.:.bt[."//usr/l
0x0030: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x0040: 64 72 62 2E 72 62 3A 35 37 33 3A 69 6E 20 60 6C drb.rb:573:in `l
0x0050: 6F 61 64 27 22 37 2F 75 73 72 2F 6C 69 62 2F 72 oad'"7/usr/lib/r
0x0060: 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E uby/1.8/drb/drb.
0x0070: 72 62 3A 36 31 32 3A 69 6E 20 60 72 65 63 76 5F rb:612:in `recv_
0x0080: 72 65 71 75 65 73 74 27 22 37 2F 75 73 72 2F 6C request'"7/usr/l
0x0090: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x00A0: 64 72 62 2E 72 62 3A 39 31 31 3A 69 6E 20 60 72 drb.rb:911:in `r
0x00B0: 65 63 76 5F 72 65 71 75 65 73 74 27 22 3C 2F 75 ecv_request'"</u
0x00C0: 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F sr/lib/ruby/1.8/
0x00D0: 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 33 30 3A drb/drb.rb:1530:
0x00E0: 69 6E 20 60 69 6E 69 74 5F 77 69 74 68 5F 63 6C in `init_with_cl
0x00F0: 69 65 6E 74 27 22 39 2F 75 73 72 2F 6C 69 62 2F ient'"9/usr/lib/
0x0100: 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 ruby/1.8/drb/drb
0x0110: 2E 72 62 3A 31 35 34 32 3A 69 6E 20 60 73 65 74 .rb:1542:in `set
0x0120: 75 70 5F 6D 65 73 73 61 67 65 27 22 33 2F 75 73 up_message'"3/us
0x0130: 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 r/lib/ruby/1.8/d
0x0140: 72 62 2F 64 72 62 2E 72 62 3A 31 34 39 34 [...]

192.168.1.38 779
19288 - VNC Server Security Type Detection

Synopsis

A VNC server is running on the remote host.

Description

This script checks the remote VNC server protocol version and the available 'security types'.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2005/07/22, Modified: 2021/07/13

Plugin Output

tcp/5900/vnc

\nThe remote VNC server chose security type #2 (VNC authentication)

192.168.1.38 780
65792 - VNC Server Unencrypted Communication Detection

Synopsis

A VNC server with one or more unencrypted 'security-types' is running on the remote host.

Description

This script checks the remote VNC server protocol version and the available 'security types' to determine if
any unencrypted 'security-types' are in use or available.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2013/04/03, Modified: 2014/03/12

Plugin Output

tcp/5900/vnc

The remote VNC server supports the following security type


which does not perform full data communication encryption :

2 (VNC authentication)

192.168.1.38 781
10342 - VNC Software Detection

Synopsis

The remote host is running a remote display software (VNC).

Description

The remote host is running VNC (Virtual Network Computing), which uses the RFB (Remote Framebuffer)
protocol to provide remote access to graphical user interfaces and thus permits a console on the remote
host to be displayed on another.

See Also

https://en.wikipedia.org/wiki/Vnc

Solution

Make sure use of this software is done in accordance with your organization's security policy and filter
incoming traffic to this port.

Risk Factor

None

Plugin Information

Published: 2000/03/07, Modified: 2017/06/12

Plugin Output

tcp/5900/vnc

The highest RFB protocol version supported by the server is :

3.3

192.168.1.38 782
189731 - Vim Installed (Linux)

Synopsis

Vim is installed on the remote Linux host.

Description

Vim is installed on the remote Linux host.

See Also

https://www.vim.org/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2024/01/29, Modified: 2024/12/03

Plugin Output

tcp/0

Path : /usr/bin/vim.tiny
Version : 7.1

192.168.1.38 783
135860 - WMI Not Available

Synopsis

WMI queries could not be made against the remote host.

Description

WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI
queries are used to gather information about the remote host, such as its current state, network interface
configuration, etc.

Without this information Nessus may not be able to identify installed software or security vunerabilities
that exist on the remote host.

See Also

https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2020/04/21, Modified: 2024/11/22

Plugin Output

tcp/445/cifs

Can't connect to the 'root\CIMV2' WMI namespace.

192.168.1.38 784
20108 - Web Server / Application favicon.ico Vendor Fingerprinting

Synopsis

The remote web server contains a graphic image that is prone to information disclosure.

Description

The 'favicon.ico' file found on the remote web server belongs to a popular web server. This may be used to
fingerprint the web server.

Solution

Remove the 'favicon.ico' file or create a custom one for your site.

Risk Factor

None

Plugin Information

Published: 2005/10/28, Modified: 2020/06/12

Plugin Output

tcp/8180/www

MD5 fingerprint : 4644f2d45601037b8423d45e13194c93


Web server : Apache Tomcat or Alfresco Community

192.168.1.38 785
11422 - Web Server Unconfigured - Default Install Page Present

Synopsis

The remote web server is not configured or is improperly configured.

Description

The remote web server uses its default welcome page. Therefore, it's probable that this server is not used
at all or is serving content that is meant to be hidden.

Solution

Disable this service if you do not use it.

Risk Factor

None

Plugin Information

Published: 2003/03/20, Modified: 2018/08/15

Plugin Output

tcp/8180/www

The default welcome page is from Tomcat.

192.168.1.38 786
11424 - WebDAV Detection

Synopsis

The remote server is running with WebDAV enabled.

Description

WebDAV is an industry standard extension to the HTTP specification.


It adds a capability for authorized users to remotely add and manage the content of a web server.

If you do not use this extension, you should disable it.

Solution

http://support.microsoft.com/default.aspx?kbid=241520

Risk Factor

None

Plugin Information

Published: 2003/03/20, Modified: 2011/03/14

Plugin Output

tcp/80/www

192.168.1.38 787
10150 - Windows NetBIOS / SMB Remote Host Information Disclosure

Synopsis

It was possible to obtain the network name of the remote host.

Description

The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB
requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/10/12, Modified: 2021/02/10

Plugin Output

udp/137/netbios-ns

The following 7 NetBIOS names have been gathered :

METASPLOITABLE = Computer name


METASPLOITABLE = Messenger Service
METASPLOITABLE = File Server Service
__MSBROWSE__ = Master Browser
WORKGROUP = Workgroup / Domain name
WORKGROUP = Master Browser
WORKGROUP = Browser Service Elections

This SMB server seems to be a Samba server - its MAC address is NULL.

192.168.1.38 788
182848 - libcurl Installed (Linux / Unix)

Synopsis

libcurl is installed on the remote Linux / Unix host.

Description

libcurl is installed on the remote Linux / Unix host.

Additional information:

- More paths will be searched and the timeout for the search will be increased if 'Perform thorough tests'
setting is enabled.

- The plugin timeout can be set to a custom value other than the plugin's default of 30 minutes via the
'timeout.182774' scanner setting in Nessus 8.15.1 or later.

Please see https://docs.tenable.com/nessus/Content/SettingsAdvanced.htm#Custom for more


information.

See Also

https://curl.se/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2023/10/10, Modified: 2024/12/03

Plugin Output

tcp/0

Nessus detected 2 installs of libcurl:

Path : libcurl3-gnutls 7.18.0-1ubuntu2 (via package manager)


Version : 7.18.0
Managed by OS : True

Path : libcurl3 7.18.0-1ubuntu2.3 (via package manager)


Version : 7.18.0
Managed by OS : True

192.168.1.38 789
52703 - vsftpd Detection

Synopsis

An FTP server is listening on the remote port.

Description

The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.

See Also

http://vsftpd.beasts.org/

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/03/17, Modified: 2019/11/22

Plugin Output

tcp/21/ftp

Source : 220 (vsFTPd 2.3.4)


Version : 2.3.4

192.168.1.38 790
192.168.1.39

2 1 2 1 32
CRITICAL HIGH MEDIUM LOW INFO

Scan Information

Start time: Thu Dec 5 16:47:23 2024


End time: Thu Dec 5 16:49:56 2024

ls
Host Information

ia
Netbios Name: WINDOWS
IP: 192.168.1.39

nt
MAC Address: 08:00:27:53:66:F1
OS: Microsoft Windows 7 Home
se
Vulnerabilities
53514 - MS11-030: Vulnerability in DNS Resolution Could Allow Remote Code Execution (2509553)
Es

(remote check)

Synopsis
us

Arbitrary code can be executed on the remote host through the installed Windows DNS client.

Description
ss

A flaw in the way the installed Windows DNS client processes Link- local Multicast Name Resolution
(LLMNR) queries can be exploited to execute arbitrary code in the context of the NetworkService account.
Ne

Note that Windows XP and 2003 do not support LLMNR and successful exploitation on those platforms
requires local access and the ability to run a special application. On Windows Vista, 2008, 7, and 2008 R2,
however, the issue can be exploited remotely.

See Also

https://www.nessus.org/u?361871b1

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

192.168.1.39 791
Risk Factor

Critical

VPR Score

7.3

EPSS Score

0.826

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.3 (CVSS2#E:F/RL:OF/RC:C)

STIG Severity

References

BID 47242
CVE CVE-2011-0657
MSKB 2509553
XREF IAVA:2011-A-0039-S
XREF MSFT:MS11-030

Exploitable With

Core Impact (true) Metasploit (true)

Plugin Information

Published: 2011/04/21, Modified: 2023/10/17

Plugin Output

udp/5355/llmnr

192.168.1.39 792
108797 - Unsupported Windows OS (remote)

Synopsis

The remote OS or service pack is no longer supported.

Description

The remote version of Microsoft Windows is either missing a service pack or is no longer supported. As a
result, it is likely to contain security vulnerabilities.

See Also

https://support.microsoft.com/en-us/lifecycle

Solution

Upgrade to a supported service pack or operating system

Risk Factor

Critical

CVSS v3.0 Base Score

10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

CVSS v2.0 Base Score

10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

References

XREF IAVA:0001-A-0501

Plugin Information

Published: 2018/04/03, Modified: 2023/07/27

Plugin Output

tcp/0

The following Windows version is installed and not supported:

Microsoft Windows 7 Home

192.168.1.39 793
97833 - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (ETERNALBLUE)
(ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaCry) (EternalRocks)
(Petya) (uncredentialed check)

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows host is affected by the following vulnerabilities :

- Multiple remote code execution vulnerabilities exist in Microsoft Server Message Block 1.0 (SMBv1)
due to improper handling of certain requests. An unauthenticated, remote attacker can exploit these
vulnerabilities, via a specially crafted packet, to execute arbitrary code. (CVE-2017-0143, CVE-2017-0144,
CVE-2017-0145, CVE-2017-0146, CVE-2017-0148)

- An information disclosure vulnerability exists in Microsoft Server Message Block 1.0 (SMBv1) due to
improper handling of certain requests. An unauthenticated, remote attacker can exploit this, via a specially
crafted packet, to disclose sensitive information. (CVE-2017-0147)

ETERNALBLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY are four of multiple


Equation Group vulnerabilities and exploits disclosed on 2017/04/14 by a group known as the Shadow
Brokers. WannaCry / WannaCrypt is a ransomware program utilizing the ETERNALBLUE exploit, and
EternalRocks is a worm that utilizes seven Equation Group vulnerabilities. Petya is a ransomware program
that first utilizes CVE-2017-0199, a vulnerability in Microsoft Office, and then spreads via ETERNALBLUE.

See Also

http://www.nessus.org/u?68fc8eff
http://www.nessus.org/u?321523eb
http://www.nessus.org/u?065561d0
http://www.nessus.org/u?d9f569cf
https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
http://www.nessus.org/u?b9d9ebf9
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3
https://github.com/stamparm/EternalRocks/
http://www.nessus.org/u?59db5b5b

Solution

Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2,
10, and 2016. Microsoft has also released emergency patches for Windows operating systems that are no
longer supported, including Windows XP, 2003, and 8.

For unsupported Windows operating systems, e.g. Windows XP, Microsoft recommends that users
discontinue the use of SMBv1. SMBv1 lacks security features that were included in later SMB versions.

192.168.1.39 794
SMBv1 can be disabled by following the vendor instructions provided in Microsoft KB2696547. Additionally,
US-CERT recommends that users block SMB directly by blocking TCP port 445 on all network boundary
devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network
boundary devices.

Risk Factor

High

CVSS v3.0 Base Score

8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVSS v3.0 Temporal Score

7.7 (CVSS:3.0/E:H/RL:O/RC:C)

VPR Score

9.8

EPSS Score

0.963

CVSS v2.0 Base Score

9.3 (CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS v2.0 Temporal Score

8.1 (CVSS2#E:H/RL:OF/RC:C)

STIG Severity

References

BID 96703
BID 96704
BID 96705
BID 96706
BID 96707
BID 96709
CVE CVE-2017-0143
CVE CVE-2017-0144
CVE CVE-2017-0145

192.168.1.39 795
CVE CVE-2017-0146
CVE CVE-2017-0147
CVE CVE-2017-0148
MSKB 4012212
MSKB 4012213
MSKB 4012214
MSKB 4012215
MSKB 4012216
MSKB 4012217
MSKB 4012606
MSKB 4013198
MSKB 4013429
MSKB 4012598
XREF EDB-ID:41891
XREF EDB-ID:41987
XREF MSFT:MS17-010
XREF IAVA:2017-A-0065
XREF CISA-KNOWN-EXPLOITED:2022/05/03
XREF CISA-KNOWN-EXPLOITED:2022/08/10
XREF CISA-KNOWN-EXPLOITED:2022/04/15
XREF CISA-KNOWN-EXPLOITED:2022/04/27
XREF CISA-KNOWN-EXPLOITED:2022/06/14

Exploitable With

CANVAS (true) Core Impact (true) Metasploit (true)

Plugin Information

Published: 2017/03/20, Modified: 2022/05/25

Plugin Output

tcp/445/cifs

Sent:
00000054ff534d4225000000001803c800000000000000000000000000088e6f0008000110000000
00ffffffff0000000000000000000000005400000054000200230000001100005c00500049005000
45005c0000000000

Received:
ff534d4225050200c09803c800000000000000000000000000088e6f00080001000000

192.168.1.39 796
90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock)
(uncredentialed check)

Synopsis

The remote Windows host is affected by an elevation of privilege vulnerability.

Description

The remote Windows host is affected by an elevation of privilege vulnerability in the Security Account
Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper
authentication level negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker
able to intercept communications between a client and a server hosting a SAM database can exploit this to
force the authentication level to downgrade, allowing the attacker to impersonate an authenticated user
and access the SAM database.

See Also

http://www.nessus.org/u?52ade1e9
http://badlock.org/

Solution

Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and
10.

Risk Factor

Medium

CVSS v3.0 Base Score

6.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)

CVSS v3.0 Temporal Score

5.9 (CVSS:3.0/E:U/RL:O/RC:C)

VPR Score

6.0

EPSS Score

0.0192

CVSS v2.0 Base Score

5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

192.168.1.39 797
CVSS v2.0 Temporal Score

4.3 (CVSS2#E:U/RL:OF/RC:C)

STIG Severity

References

BID 86002
CVE CVE-2016-0128
MSKB 3148527
MSKB 3149090
MSKB 3147461
MSKB 3147458
XREF MSFT:MS16-047
XREF CERT:813296
XREF IAVA:2016-A-0093

Plugin Information

Published: 2016/04/13, Modified: 2019/07/23

Plugin Output

tcp/49157/dce-rpc

192.168.1.39 798
57608 - SMB Signing not required

Synopsis

Signing is not required on the remote SMB server.

Description

Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to
conduct man-in-the-middle attacks against the SMB server.

See Also

http://www.nessus.org/u?df39b8b3
http://technet.microsoft.com/en-us/library/cc731957.aspx
http://www.nessus.org/u?74b80723
https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
http://www.nessus.org/u?a3cac4ea

Solution

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting
'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server
signing'. See the 'see also' links for further details.

Risk Factor

Medium

CVSS v3.0 Base Score

5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVSS v3.0 Temporal Score

4.6 (CVSS:3.0/E:U/RL:O/RC:C)

CVSS v2.0 Base Score

5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS v2.0 Temporal Score

3.7 (CVSS2#E:U/RL:OF/RC:C)

Plugin Information

192.168.1.39 799
Published: 2012/01/19, Modified: 2022/10/05

Plugin Output

tcp/445/cifs

192.168.1.39 800
10114 - ICMP Timestamp Request Remote Date Disclosure

Synopsis

It is possible to determine the exact time set on the remote host.

Description

The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that
is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-
based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect,
but usually within 1000 seconds of the actual system time.

Solution

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

Risk Factor

Low

VPR Score

4.2

EPSS Score

0.8808

CVSS v2.0 Base Score

2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)

References

CVE CVE-1999-0524
XREF CWE:200

Plugin Information

Published: 1999/08/01, Modified: 2024/10/07

Plugin Output

icmp/0

The ICMP timestamps seem to be in little endian format (not in network format)

192.168.1.39 801
The difference between the local and remote clocks is -550 seconds.

192.168.1.39 802
45590 - Common Platform Enumeration (CPE)

Synopsis

It was possible to enumerate CPE names that matched on the remote system.

Description

By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform
Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE
based on the information available from the scan.

See Also

http://cpe.mitre.org/
https://nvd.nist.gov/products/cpe

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2010/04/21, Modified: 2024/11/22

Plugin Output

tcp/0

The remote operating system matched the following CPE :

cpe:/o:microsoft:windows_7:::home -> Microsoft Windows 7

192.168.1.39 803
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/135/epmap

The following DCERPC services are available locally :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc04AE30

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WindowsShutdown

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc04AE30

Object UUID : 6d726574-7273-0076-0000-000000000000


UUID : c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1.0

192.168.1.39 804
Description : Unknown RPC service
Annotation : Impl friendly name
Type : Local RPC service
Named pipe : LRPC-f698f46f6e03d65c40

Object UUID : 52ef130c-08fd-4388-86b3-6edf00000001


UUID : 12e65dd8-887f-41ef-91bf-8d816c42c2e7, version 1.0
Description : Unknown RPC service
Annotation : Secure Desktop LRPC interface
Type : Local RPC service
Named pipe : WMsgKRpc04DF71

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000001


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : WMsgKRpc04DF71

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 4b112204-0e19-11d3-b42b-0000f81feb9f, version 1.0
Description : SSDP service
Windows process : unknow
Type : Local RPC service
Named pipe : LRPC-5e5fa57fdf81f593f9

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : LRPC-4e8a36a006b3be3a04

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-ab [...]

192.168.1.39 805
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/445/cifs

The following DCERPC services are available remotely :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\WINDOWS

Object UUID : b08669ee-8cb5-43a5-a017-84fe00000000


UUID : 76f226c3-ec14-4325-8a99-6a46348418af, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\InitShutdown
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \pipe\lsass
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe

192.168.1.39 806
Type : Remote RPC service
Named pipe : \PIPE\protected_storage
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : b58aa02e-2884-4e97-8176-4ee06d794184, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \pipe\trkwks
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WINDOWS

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c [...]

192.168.1.39 807
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/49152/dce-rpc

The following DCERPC services are available on TCP port 49152 :

Object UUID : 765294ba-60bc-48b8-92e9-89fd77769d91


UUID : d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49152
IP : 192.168.1.39

192.168.1.39 808
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/49153/dce-rpc

The following DCERPC services are available on TCP port 49153 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1.0
Description : Unknown RPC service
Annotation : Event log TCPIP
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 30adc50c-5cbc-46ce-9a0e-91914789e23c, version 1.0
Description : Unknown RPC service
Annotation : NRP server endpoint
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000

192.168.1.39 809
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1.0
Description : Unknown RPC service
Annotation : DHCPv6 Client LRPC Endpoint
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 06bba54a-be05-49f9-b0a0-30f790261023, version 1.0
Description : Unknown RPC service
Annotation : Security Center
Type : Remote RPC service
TCP Port : 49153
IP : 192.168.1.39

192.168.1.39 810
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/49154/dce-rpc

The following DCERPC services are available on TCP port 49154 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 86d35949-83c9-4044-b424-db363231fd0c, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1.0
Description : Unknown RPC service
Annotation : IP Transition Configuration endpoint
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1.0
Description : Unknown RPC service
Annotation : IKE/Authip API
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 98716d03-89ac-44c7-bb8c-285824e51c4a, version 1.0
Description : Unknown RPC service

192.168.1.39 811
Annotation : XactSrv service
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1.0
Description : Unknown RPC service
Annotation : AppInfo
Type : Remote RPC service
TCP Port : 49154
IP : 192.168.1.39

192.168.1.39 812
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/49155/dce-rpc

The following DCERPC services are available on TCP port 49155 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 367abb81-9844-35f1-ad32-98f038001003, version 2.0
Description : Service Control Manager
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 49155
IP : 192.168.1.39

192.168.1.39 813
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/49156/dce-rpc

The following DCERPC services are available on TCP port 49156 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1.0
Description : Unknown RPC service
Annotation : Remote Fw APIs
Type : Remote RPC service
TCP Port : 49156
IP : 192.168.1.39

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Remote RPC service
TCP Port : 49156
IP : 192.168.1.39

192.168.1.39 814
10736 - DCE Services Enumeration

Synopsis

A DCE/RPC service is running on the remote host.

Description

By sending a Lookup request to the portmapper (TCP 135 or epmapper PIPE) it was possible to enumerate
the Distributed Computing Environment (DCE) services running on the remote port. Using this information
it is possible to connect and bind to each service by sending an RPC request to the remote port/pipe.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/08/26, Modified: 2021/10/04

Plugin Output

tcp/49157/dce-rpc

The following DCERPC services are available on TCP port 49157 :

Object UUID : 00000000-0000-0000-0000-000000000000


UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 49157
IP : 192.168.1.39

192.168.1.39 815
54615 - Device Type

Synopsis

It is possible to guess the remote device type.

Description

Based on the remote operating system, it is possible to determine what the remote system type is (eg: a
printer, router, general-purpose computer, etc).

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2011/05/23, Modified: 2022/09/09

Plugin Output

tcp/0

Remote device type : general-purpose


Confidence level : 99

192.168.1.39 816
35716 - Ethernet Card Manufacturer Detection

Synopsis

The manufacturer can be identified from the Ethernet OUI.

Description

Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are
registered by IEEE.

See Also

https://standards.ieee.org/faqs/regauth.html
http://www.nessus.org/u?794673b4

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2009/02/19, Modified: 2020/05/13

Plugin Output

tcp/0

The following card manufacturers were identified :

08:00:27:53:66:F1 : PCS Systemtechnik GmbH

192.168.1.39 817
86420 - Ethernet MAC Addresses

Synopsis

This plugin gathers MAC addresses from various sources and consolidates them into a list.

Description

This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and
Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single,
unique, and uniform list.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2015/10/16, Modified: 2020/05/13

Plugin Output

tcp/0

The following is a consolidated list of detected MAC addresses:


- 08:00:27:53:66:F1

192.168.1.39 818
53513 - Link-Local Multicast Name Resolution (LLMNR) Detection

Synopsis

The remote device supports LLMNR.

Description

The remote device answered to a Link-local Multicast Name Resolution (LLMNR) request. This protocol
provides a name lookup service similar to NetBIOS or DNS. It is enabled by default on modern Windows
versions.

See Also

http://www.nessus.org/u?51eae65d
http://technet.microsoft.com/en-us/library/bb878128.aspx

Solution

Make sure that use of this software conforms to your organization's acceptable use and security policies.

Risk Factor

None

Plugin Information

Published: 2011/04/21, Modified: 2023/10/17

Plugin Output

udp/5355/llmnr

According to LLMNR, the name of the remote host is 'Windows'.

192.168.1.39 819
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure

Synopsis

It was possible to obtain information about the remote operating system.

Description

Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by
sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on
the host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2001/10/17, Modified: 2021/09/20

Plugin Output

tcp/445/cifs

The remote Operating System is : Windows 7 Home Basic 7601 Service Pack 1
The remote native LAN manager is : Windows 7 Home Basic 6.1
The remote SMB Domain Name is : WINDOWS

192.168.1.39 820
26917 - Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry

Synopsis

Nessus is not able to access the remote Windows Registry.

Description

It was not possible to connect to PIPE\winreg on the remote host.

If you intend to use Nessus to perform registry-based checks, the registry checks will not work because the
'Remote Registry Access'
service (winreg) has been disabled on the remote host or can not be connected to with the supplied
credentials.

Solution

n/a

Risk Factor

None

References

XREF IAVB:0001-B-0506

Plugin Information

Published: 2007/10/04, Modified: 2020/09/22

Plugin Output

tcp/445/cifs

Could not connect to the registry because:


Could not connect to \winreg

192.168.1.39 821
11011 - Microsoft Windows SMB Service Detection

Synopsis

A file / print sharing service is listening on the remote host.

Description

The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/06/05, Modified: 2021/02/11

Plugin Output

tcp/139/smb

An SMB server is running on this port.

192.168.1.39 822
11011 - Microsoft Windows SMB Service Detection

Synopsis

A file / print sharing service is listening on the remote host.

Description

The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB)
protocol, used to provide shared access to files, printers, etc between nodes on a network.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2002/06/05, Modified: 2021/02/11

Plugin Output

tcp/445/cifs

A CIFS server is running on this port.

192.168.1.39 823
100871 - Microsoft Windows SMB Versions Supported (remote check)

Synopsis

It was possible to obtain information about the version of SMB running on the remote host.

Description

Nessus was able to obtain the version of SMB running on the remote host by sending an authentication
request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2017/06/19, Modified: 2019/11/22

Plugin Output

tcp/445/cifs

The remote host supports the following versions of SMB :


SMBv1
SMBv2

192.168.1.39 824
106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)

Synopsis

It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.

Description

Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an
authentication request to port 139 or 445.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2018/02/09, Modified: 2020/03/11

Plugin Output

tcp/445/cifs

The remote host supports the following SMB dialects :


_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7

The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
3.1.1 Windows 10

192.168.1.39 825
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/135/epmap

Port 135/tcp was found to be open

192.168.1.39 826
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/139/smb

Port 139/tcp was found to be open

192.168.1.39 827
11219 - Nessus SYN scanner

Synopsis

It is possible to determine which TCP ports are open.

Description

This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might
cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the
network is loaded.

Solution

Protect your target with an IP filter.

Risk Factor

None

Plugin Information

Published: 2009/02/04, Modified: 2024/05/20

Plugin Output

tcp/445/cifs

Port 445/tcp was found to be open

192.168.1.39 828
19506 - Nessus Scan Information

Synopsis

This plugin displays information about the Nessus scan.

Description

This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.


- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2005/08/26, Modified: 2024/10/04

Plugin Output

tcp/0

Information about this scan :

Nessus version : 10.8.3


Nessus build : 20010
Plugin feed version : 202412050432
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : debian10-x86-64
Scan type : Normal
Scan name : Advanced Scan using Nessus

192.168.1.39 829
Scan policy used : Advanced Scan
Scanner IP : 192.168.1.34
Port scanner(s) : nessus_syn_scanner
Port range : default
Ping RTT : 201.765 ms
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : no
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : disabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : None
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2024/12/5 16:48 IST
Scan duration : 114 sec
Scan for malware : no

192.168.1.39 830
24786 - Nessus Windows Scan Not Performed with Admin Privileges

Synopsis

The Nessus scan of this host may be incomplete due to insufficient privileges provided.

Description

The Nessus scanner testing the remote host has been given SMB credentials to log into the remote host,
however these credentials do not have administrative privileges.

Typically, when Nessus performs a patch audit, it logs into the remote host and reads the version of
the DLLs on the remote host to determine if a given patch has been applied or not. This is the method
Microsoft recommends to determine if a patch has been applied.

If your Nessus scanner does not have administrative privileges when doing a scan, then Nessus has to fall
back to perform a patch audit through the registry which may lead to false positives (especially when using
third-party patch auditing tools) or to false negatives (not all patches can be detected through the registry).

Solution

Reconfigure your scanner to use credentials with administrative privileges.

Risk Factor

None

References

XREF IAVB:0001-B-0505

Plugin Information

Published: 2007/03/12, Modified: 2020/09/22

Plugin Output

tcp/0

It was not possible to connect to '\\WINDOWS\ADMIN$' with the supplied credentials.

192.168.1.39 831
11936 - OS Identification

Synopsis

It is possible to guess the remote operating system.

Description

Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess
the name of the remote operating system in use. It is also possible sometimes to guess the version of the
operating system.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2003/12/09, Modified: 2024/10/14

Plugin Output

tcp/0

Remote operating system : Microsoft Windows 7 Home


Confidence level : 99
Method : MSRPC

Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.

SinFP:!:
P1:B11113:F0x12:W8192:O0204ffff:M1460:
P2:B11113:F0x12:W8192:O0204ffff010303080402080affffffff44454144:M1460:
P3:B11121:F0x04:W0:O0:M0
P4:191003_7_p=135

The remote host is running Microsoft Windows 7 Home

192.168.1.39 832
117886 - OS Security Patch Assessment Not Available

Synopsis

OS Security Patch Assessment is not available.

Description

OS Security Patch Assessment is not available on the remote host.


This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment may not be supported for the
target, the target may not have been identified, or another issue may have occurred that prevented OS
security patch assessment from being available. See plugin output for details.

This plugin reports non-failure information impacting the availability of OS Security Patch Assessment.
Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is
not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks
Not Supported' will report concurrently with this plugin.

Solution

n/a

Risk Factor

None

References

XREF IAVB:0001-B-0515

Plugin Information

Published: 2018/10/02, Modified: 2021/07/12

Plugin Output

tcp/0

The following issues were reported :

- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SMB service.

192.168.1.39 833
96982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)

Synopsis

The remote Windows host supports the SMBv1 protocol.

Description

The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft
recommends that users discontinue the use of SMBv1 due to the lack of security features that were
included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that
affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-
CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.

See Also

https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
https://support.microsoft.com/en-us/help/2696547/how-to-detect-enable-and-disable-smbv1-smbv2-and-
smbv3-in-windows-and
http://www.nessus.org/u?8dcab5e4
http://www.nessus.org/u?234f8ef8
http://www.nessus.org/u?4c7e0cf3

Solution

Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB
directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block
TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.

Risk Factor

None

References

XREF IAVT:0001-T-0710

Plugin Information

Published: 2017/02/03, Modified: 2020/09/22

Plugin Output

tcp/445/cifs

The remote host supports SMBv1.

192.168.1.39 834
192.168.1.39 835
25220 - TCP/IP Timestamps Supported

Synopsis

The remote service implements TCP timestamps.

Description

The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that
the uptime of the remote host can sometimes be computed.

See Also

http://www.ietf.org/rfc/rfc1323.txt

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2007/05/16, Modified: 2023/10/17

Plugin Output

tcp/0

192.168.1.39 836
110723 - Target Credential Status by Authentication Protocol - No Credentials Provided

Synopsis

Nessus was able to find common ports used for local checks, however, no credentials were provided in the
scan policy.

Description

Nessus was not able to successfully authenticate directly to the remote target on an available
authentication protocol. Nessus was able to connect to the remote port and identify that the service
running on the port supports an authentication protocol, but Nessus failed to authenticate to the
remote service using the provided credentials. There may have been a protocol failure that prevented
authentication from being attempted or all of the provided credentials for the authentication protocol may
be invalid. See plugin output for error details.

Please note the following :

- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and
not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were
provided for an available SNMP service.

- Providing valid credentials for all available authentication protocols may improve scan coverage, but the
value of successful authentication for a given protocol may vary from target to target depending upon what
data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is
more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is
more valuable for Windows targets than for Linux targets.

Solution

n/a

Risk Factor

None

References

XREF IAVB:0001-B-0504

Plugin Information

Published: 2018/06/27, Modified: 2024/04/19

Plugin Output

tcp/0

SMB was detected on port 445 but no credentials were provided.


SMB local checks were not enabled.

192.168.1.39 837
192.168.1.39 838
10287 - Traceroute Information

Synopsis

It was possible to obtain traceroute information.

Description

Makes a traceroute to the remote host.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/11/27, Modified: 2023/12/04

Plugin Output

udp/0

For your information, here is the traceroute from 192.168.1.34 to 192.168.1.39 :


192.168.1.34
192.168.1.39

Hop Count: 1

192.168.1.39 839
135860 - WMI Not Available

Synopsis

WMI queries could not be made against the remote host.

Description

WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI
queries are used to gather information about the remote host, such as its current state, network interface
configuration, etc.

Without this information Nessus may not be able to identify installed software or security vunerabilities
that exist on the remote host.

See Also

https://docs.microsoft.com/en-us/windows/win32/wmisdk/wmi-start-page

Solution

n/a

Risk Factor

None

Plugin Information

Published: 2020/04/21, Modified: 2024/11/22

Plugin Output

tcp/445/cifs

Can't connect to the 'root\CIMV2' WMI namespace.

192.168.1.39 840
10150 - Windows NetBIOS / SMB Remote Host Information Disclosure

Synopsis

It was possible to obtain the network name of the remote host.

Description

The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB
requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.

Solution

n/a

Risk Factor

None

Plugin Information

Published: 1999/10/12, Modified: 2021/02/10

Plugin Output

udp/137/netbios-ns

The following 4 NetBIOS names have been gathered :

WINDOWS = Computer name


WORKGROUP = Workgroup / Domain name
WINDOWS = File Server Service
WORKGROUP = Browser Service Elections

The remote host has the following MAC address on its adapter :

08:00:27:53:66:f1

192.168.1.39 841

You might also like