Go to the Italian version of this page. Can Service Pack 2 be installed on all XP installations? Ordering the service pack on a CD. Windows 2000 is a continuation of the Microsoft Windows NT family of operating systems, replacing Windows NT 4.0. The original name for the operating system was. Windows 2000 (codenamed NT 5.0 and Neptune) is built on NT Technology as a line of operating systems produced by Microsoft for use on personal computers, business. In dit artikel, dat voornamelijk bedoeld is voor IT-professionals, worden de correcties vermeld die zijn toegevoegd aan Windows XP Service Pack 3. Nessus Report. Port (0/tcp)Plugin ID: 1. Microsoft Windows - Users Information : Passwords never expires. Synopsis. At least one user has a password that never expires. List of Hosts. 19. Plugin Output. The following users have passwords that never expire : - Guest- WIN- 8. BPIQBRO0. CX$- EXCHANGE$Note that, in addition to the Administrator, Guest, and Kerberosaccounts, Nessus has enumerated only those domain users with UIDsbetween 1. To use a different range, edit the scan policyand change the 'Start UID' and/or 'End UID' preferences for thisplugin, then re- run the scan. Description. Using the supplied credentials, it is possible to list users whosepasswords never expire. Solution. Allow / require users to change their passwords regularly. Risk Factor. None. Plugin publication date: 2. Plugin last modification date: 2. Port cifs (4. 45/tcp)Plugin ID: 1. Microsoft Windows SMB Shares Enumeration. Synopsis. It is possible to enumerate remote network shares. List of Hosts. 19. Plugin Output. Here are the SMB shares available on the remote host when logged as administrator: - ADMIN$- C$- IPC$- NETLOGON- SYSVOLDescription. By connecting to the remote host, Nessus was able to enumerate the network share names. Solution. N/ARisk Factor. None. Plugin publication date: 2. Plugin last modification date: 2. Port cifs (4. 45/tcp)Plugin ID: 5. MS KB2. 52. 43. 75: Fraudulent Digital Certificates Could Allow Spoofing. Synopsis. The remote Windows host has an out- of- date SSL certificate blacklist. List of Hosts. 19. Plugin Output. Nessus was unable to open the following registry key : SOFTWARE\Microsoft\System. Certificates\Disallowed\Certificates\1. This guide describes certificates created with a Microsoft CA and also contains steps for when you use a self-signing certificate which is supported as of Cisco. Synopsis The remote Windows host is missing a security update containing ActiveX kill bits. List of Hosts 192.168.1.180. Plugin Output The kill-bit has not been set. The client communicates with the RADIUS server (such as NPS or IAS on a Windows Server) through the access point or switch via one of several different. Windows 2000, Windows Server 2003, Windows XP Any application capable of displaying PDF files. In Windows XP and Windows Server 2003, the Wireless Zero Configuration service controlled 802.1X for wired connections, which is enabled by default. Compatibilidad con una amplia gama de opciones LAN y WAN inal A2. AF3. 46. D3. 99. F5. 03. 13. C3. 93. F1. 41. 40. 45. 66. This indicates the update has not been applied. Description. The remote host is missing KB2. SSLcertificate blacklist. A certificate authority (CA) has revoked a number of fraudulent SSLcertificates for several prominent public websites. If an attacker can trick someone into using the affected browser andvisiting a malicious site using one of the fraudulent certificates, hemay be able to fool that user into believing the site is a legitimateone. If these Active. X controls are ever installed on the remote host,either now or in the future, they would expose it to various securityissues. Solution. Microsoft has released an advisory about this : http: //www. Risk Factor. High/ CVSS Base Score: 9. CVSS2#AV: N/AC: M/Au: N/C: C/I: C/A: C)CVSS Temporal Score: 7. CVSS2#E: F/RL: OF/RC: C)CVECVE- 2. Bugtraq ID3. 36. 63. Other references. OSVDB: 5. 18. 33. CWE: 1. 19. Plugin publication date: 2. Plugin last modification date: 2. Ease of exploitability: Exploits are available. Exploitable with: Canvas (D2. Exploit. Pack)Port (0/tcp)Plugin ID: 1. Microsoft Windows - Users Information : disabled accounts. Synopsis. At least one user account has been disabled. List of Hosts. 19. Plugin Output. The following user accounts have been disabled : - Guest- krbtgt- 2. E6. E5. E- 0. 2B7- 4. F0- BNote that, in addition to the Administrator, Guest, and Kerberosaccounts, Nessus has enumerated only those domain users with UIDsbetween 1. To use a different range, edit the scan policyand change the 'Start UID' and/or 'End UID' preferences for 'SMB use domain SID to enumerate users' setting, and then re- run the scan. Description. Using the supplied credentials, it is possible to list user accountsthat have been disabled. Solution. Delete accounts that are no longer needed. Risk Factor. None. Plugin publication date: 2. Plugin last modification date: 2. Port cifs (4. 45/tcp)Plugin ID: 1. Microsoft Windows SMB Native. Lan. Manager Remote System Information Disclosure. Synopsis. It is possible to obtain information about the remote operating. List of Hosts. 19. Plugin Output. The remote Operating System is : Windows Server (R) 2. Standard 6. 00. 1 Service Pack 1. The remote native lan manager is : Windows Server (R) 2. Standard 6. 0. The remote SMB Domain Name is : TXDescription. It is possible to get the remote operating system name andversion (Windows and/or Samba) by sending an authenticationrequest to port 1. Solutionn/a. Risk Factor. None. Plugin publication date: 2. Plugin last modification date: 2. Port cifs (4. 45/tcp)Plugin ID: 4. MS0. 9- 0. 38: Vulnerabilities in Windows Media File Processing Could Allow Remote Code Execution (9. Synopsis. Arbitrary code can be executed on the remote host through Windows. Media file processing. List of Hosts. 19. Plugin Output- C: \Windows\System. Avifil. 32. dll has not been patched. Remote version : 6. Should be : 6. 0. Description. The remote Windows host is affected by two vulnerabilities involvingthe way in which AVI headers are processed and AVI data is validatedthat could be abused to execute arbitrary code remotely. If an attacker can trick a user on the affected system into openinga specially crafted AVI file, he may be able to leverage these issuesto execute arbitrary code subject to the user's privileges. Solution. Microsoft has released a set of patches for Windows 2. XP, 2. 00. 3,Vista and 2. Bulletin/MS0. 9- 0. Risk Factor. High/ CVSS Base Score: 9. CVSS2#AV: N/AC: M/Au: N/C: C/I: C/A: C)CVSS Temporal Score: 7. CVSS2#E: POC/RL: OF/RC: C)CVECVE- 2. CVE- 2. 00. 9- 1. Bugtraq ID3. 59. 67. Other references. OSVDB: 5. 69. 08. OSVDB: 5. 69. 09. CWE: 1. 89. MSFT: MS0. Vulnerability publication date: 2. Patch publication date: 2. Plugin publication date: 2. Plugin last modification date: 2. Ease of exploitability: Exploits are available. Port cifs (4. 45/tcp)Plugin ID: 4. MS1. 0- 0. 54: Vulnerabilities in SMB Server Could Allow Remote Code Execution (9. Synopsis. It is possible to execute arbitrary code on the remote Windows host. SMB implementation. List of Hosts. 19. Description. The remote host is affected by several vulnerabilities in the SMBserver that may allow an attacker to execute arbitrary code or performa denial of service against the remote host. To use a different range, edit the scan policyand change the 'Start UID' and/or 'End UID' preferences for 'SMB use domain SID to enumerate users' setting, and then re- run the scan. Description. Using the supplied credentials, it is possible to list users who havenever logged into their accounts. Solution. Delete accounts that are not needed. Risk Factor. None. Plugin publication date: 2. Plugin last modification date: 2. Port (0/tcp)Plugin ID: 1. Microsoft Windows - Local Users Information : Disabled accounts. Synopsis. At least one local user account has been disabled. List of Hosts. 19. Plugin Output. The following local user accounts have been disabled : - Guest- 2. E6. E5. E- 0. 2B7- 4. F0- BNote that, in addition to the Administrator and Guest accounts, Nessushas only checked for local users with UIDs between 1. To use a different range, edit the scan policy and change the 'Start. UID' and/or 'End UID' preferences for 'SMB use host SID to enumerate local users' setting, and then re- run the scan. Description. Using the supplied credentials, it is possible to list local useraccounts that have been disabled. Solution. Delete accounts that are no longer needed. Risk Factor. None. Other references. OSVDB: 7. 52. Vulnerability publication date: 1. Plugin publication date: 2. Plugin last modification date: 2. Port cifs (4. 45/tcp)Plugin ID: 3. MS0. 8- 0. 32: Cumulative Security Update of Active. X Kill Bits (9. 50. Synopsis. The remote Windows host has an Active. X control that is affected by. List of Hosts. 19. Plugin Output. The kill- bit has not been set for the following control . The version of this control installed on the remote host reportedlycontains multiple memory corruption flaws. An attacker, exploiting this flaw, can execute arbitrary commands onthe remote host subject to the privileges of the user opening thefile. Solution. Microsoft has released a set of patches for Windows XP, 2. Vista,2. 00. 8, 7, and 2. R2 : http: //www. Risk Factor. High/ CVSS Base Score: 9. CVSS2#AV: N/AC: M/Au: N/C: C/I: C/A: C)CVSS Temporal Score: 6. CVSS2#E: U/RL: OF/RC: C)CVECVE- 2. Bugtraq ID4. 05. 74. Other references. OSVDB: 6. 52. 19. MSFT: MS1. 0- 0. 83. Vulnerability publication date: 2. Patch publication date: 2. Plugin publication date: 2. Plugin last modification date: 2. Ease of exploitability: No known exploits are available. Port cifs (4. 45/tcp)Plugin ID: 3. MS0. 9- 0. 12: Vulnerabilities in Windows Could Allow Elevation of Privilege (9. Synopsis. A local user can elevate his privileges on the remote host. List of Hosts. 19. Plugin Output- C: \Windows\System. Ntoskrnl. exe has not been patched. Remote version : 6. Should be : 6. 0. Description. The version of Windows running on the remote host is affected bypotentially four vulnerabilities involving its MSDTC transactionfacility and/or Windows Service Isolation that may allow a local userto escalate his privileges and take complete control of the affectedsystem. Solution. Microsoft has released a set of patches for Windows 2. XP, 2. 00. 3,Vista and 2. Bulletin/MS0. 9- 0. Risk Factor. High/ CVSS Base Score: 7. CVSS2#AV: L/AC: L/Au: N/C: C/I: C/A: C)CVSS Temporal Score: 5. CVSS2#E: POC/RL: OF/RC: C)CVECVE- 2. CVE- 2. 00. 9- 0. CVE- 2. 00. 9- 0. CVE- 2. 00. 9- 0. Bugtraq ID2. 88. 33. Other references. OSVDB: 4. 45. 80. OSVDB: 5. 36. 66. OSVDB: 5. 36. 67. OSVDB: 5. 36. 68. CWE: 2. 64. MSFT: MS0. Plugin publication date: 2. Plugin last modification date: 2. Ease of exploitability: Exploits are available. Exploitable with: Core Impact. Port cifs (4. 45/tcp)Plugin ID: 5. MS1. 1- 0. 07: Vulnerability in the Open. Type Compact Font Format (CFF) Driver Could Allow Remote Code Execution (2. Synopsis. The remote Windows host contains a font driver that is affected by a. List of Hosts. 19. Plugin Output- C: \Windows\system. Atmfd. dll has not been patched. Remote version : 5. Should be : 5. 1. Description. The remote Windows host contains a version of the Open. Type Compact. Font Format (CFF) Font Driver that fails to properly validate certaindata passed from user mode to kernel mode.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |