"Mr. joej" wrote: > > After some testing this is what was found. Internet Scanner only > tests for this bug if it can either gain access to a shell (by > guessing the telnet password), or by getting snmp access to get > the IOS version information. Based upon this, Internet Scanner > determines whether or not the router is vulnerable. This is WRONG. Actually, this type of activity is a pretty common problem and is done in the interest of speed. For example take the following situation: Joe Admin installs SP4 on his NT 4.0 server Joe Admin removes and installs TCP/IP from CD Joe Admin runs a security check As we all know the above system is vulnerable. This is because the original executables and DLL's have been loaded from the original CD. Many security audit tools that I've tested would in fact say that the system is safe because SP4 has been installed. This is because instead of checking file dates, they are looking for registry keys which identify what patches have been loaded on the system. I personally can not say if ISS's scanners fall into the same boat, but from my testing I know many do. Cheers, Chris -- ************************************** cbrentonat_private * Multiprotocol Network Design & Troubleshooting http://www.amazon.com/exec/obidos/ASIN/0782120822/geekspeaknet * Mastering Network Security http://www.amazon.com/exec/obidos/ASIN/0782123430/geekspeaknet
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:33:02 PDT