| Date: Tue, 
        7 May 2002 16:46:31 +0200 From: Florian Cramer <cantsin@zedat.fu-berlin.de>
 To: Nettime <nettime-l@bbs.thing.net>
 
 Am Tue, 07.May.2002 
        um 13:14:24 +0200x schrieb knowbotic.research:>
 > In the project, we are using non-invasive SECURITY scanning tools, 
        which
 > systems administrators alike use in order to detect security holes 
        on the
 >
 All 1549 scanned ports on (209.73.19.97) are: UNfiltered
 Interesting ports on (209.73.19.97):
 (The 1542 ports scanned but not shown below are in state: closed)
 Port State Service
 22/tcp open ssh
 80/tcp open http
 111/tcp open sunrpc
 443/tcp open https
 901/tcp open samba-swat
 3306/tcp open mysql
 6000/tcp open X11
 + unitedwehack.ath.cx 
        :. List of open ports :
 o general/tcp (Security warnings found)
 o general/udp (Security notes found)
 o unknown (32768/tcp) (Security warnings found)
 o general/icmp (Security warnings found)
 . Warning found on port general/tcp
  Microsoft Windows 95 and 98 clients have the ability
 to bind multiple TCP/IP stacks on the same MAC address,
 simply by having the protocol addded more than once
 in the Network Control panel.
 
 The remote host has several TCP/IP stacks with the
 same IP binded on the same MAC adress. As a result,
 it will reply several times to the same packets,
 such as by sending multiple ACK to a single SYN,
 creating noise on your network. If several hosts
 behave the same way, then your network will be brought
 down.
 
 Solution : remove all the IP stacks except one in the remote
 host
 Risk factor :
 Medium
  . Warning 
        found on port general/tcp  The remote host uses non-random IP IDs, that is, it is
 possible to predict the next value of the ip_id field of
 the ip packets sent by this host.
 
 An attacker may use this feature to determine if the remote
 host sent a packet in reply to another request. This may be
 used for portscanning and other things.
 
 Solution : Contact your vendor for a patch
 Risk factor :
 Low
  . Information 
        found on port general/udp  For your 
        information, here is the traceroute to 209.73.19.97 : 160.45.155.1
 130.133.98.2
 188.1.33.33
 188.1.20.5
 188.1.18.110
 134.222.130.229
 134.222.231.5
 134.222.230.17
 134.222.230.6
 134.222.229.238
 134.222.229.234
 205.171.30.145
 205.171.230.22
 205.171.30.86
 205.171.62.2
 206.252.135.2
 209.73.19.65
 209.73.19.97
 . Warning found on port unknown (32768/tcp)
  The fam 
        RPC service is running. Several versions of this service have
 a well-known buffer oveflow condition
 that allows intruders to execute
 arbitrary commands as root on this system.
 
 Solution : disable this service in /etc/inetd.conf
 More information :
 http://www.nai.com/nai_labs/asp_set/advisory/16_fam_adv.asp
 Risk factor : High
 CVE : CVE-1999-0059
 Warning found on port general/icmp
 The remote 
        host answers to an ICMP timestamprequest. This allows an attacker to know the
 date which is set on your machine.
 
 This may help him to defeat all your
 time based authentifications protocols.
 
 Solution : filter out the icmp timestamp
 requests (13), and the outgoing icmp
 timestamp replies (14).
 
 Risk factor : Low
 CVE : CAN-1999-0524
 Florian |