ID OPENVAS:10761 Type openvas Reporter This script is Copyright (C) 2001 Alert4Web.com Modified 2017-12-07T00:00:00
Description
This detects the CIS ports by connecting to the server and
processing the buffer received.
CIS (COM+ Internet Services) are RPC over HTTP tunneling
and requires IIS to operate.
CIS ports shouldn't be visible on internet but only behind a firewall.
If you do not use this service, then disable it as it may become
a security threat in the future, if a vulnerability is discovered.
# OpenVAS Vulnerability Test
# $Id: ncacn_http.nasl 8023 2017-12-07 08:36:26Z teissa $
# Description: Detect CIS ports
#
# Authors:
# Georges Dagousset <georges.dagousset@alert4web.com>
#
# Copyright:
# Copyright (C) 2001 Alert4Web.com
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
tag_summary = "This detects the CIS ports by connecting to the server and
processing the buffer received.
CIS (COM+ Internet Services) are RPC over HTTP tunneling
and requires IIS to operate.
CIS ports shouldn't be visible on internet but only behind a firewall.
If you do not use this service, then disable it as it may become
a security threat in the future, if a vulnerability is discovered.";
tag_solution = "Disable CIS with DCOMCNFG or protect CIS ports by a Firewall.
http://support.microsoft.com/support/kb/articles/Q282/2/61.ASP
For more information about CIS:
http://msdn.microsoft.com/library/en-us/dndcom/html/cis.asp";
if(description)
{
script_id(10761);
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:N");
script_version("$Revision: 8023 $");
script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"0.0");
name = "Detect CIS ports";
script_name(name);
script_category(ACT_GATHER_INFO);
script_tag(name:"qod_type", value:"remote_banner");
script_copyright("This script is Copyright (C) 2001 Alert4Web.com");
family = "Service detection";
script_family(family);
script_dependencies("find_service.nasl");
script_require_ports("Services/ncacn_http");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
exit(0);
}
#
# The script code starts here
#
port = get_kb_item("Services/ncacn_http");
if (!port)exit(0);
key = string("ncacn_http/banner/", port);
banner = get_kb_item(key);
if(banner)
{
data = string("There is a CIS (COM+ Internet Services) on this port\nServer banner :\n", banner);
log_message(port:port, data:data);
}
{"id": "OPENVAS:10761", "type": "openvas", "bulletinFamily": "scanner", "title": "Detect CIS ports", "description": "This detects the CIS ports by connecting to the server and\nprocessing the buffer received.\n\nCIS (COM+ Internet Services) are RPC over HTTP tunneling\nand requires IIS to operate.\nCIS ports shouldn't be visible on internet but only behind a firewall.\n\nIf you do not use this service, then disable it as it may become\na security threat in the future, if a vulnerability is discovered.", "published": "2005-11-03T00:00:00", "modified": "2017-12-07T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "http://plugins.openvas.org/nasl.php?oid=10761", "reporter": "This script is Copyright (C) 2001 Alert4Web.com", "references": [], "cvelist": [], "lastseen": "2017-12-08T11:44:11", "viewCount": 0, "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2017-12-08T11:44:11", "rev": 2}, "dependencies": {"references": [], "modified": "2017-12-08T11:44:11", "rev": 2}, "vulnersScore": 0.1}, "pluginID": "10761", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: ncacn_http.nasl 8023 2017-12-07 08:36:26Z teissa $\n# Description: Detect CIS ports\n#\n# Authors:\n# Georges Dagousset <georges.dagousset@alert4web.com>\n#\n# Copyright:\n# Copyright (C) 2001 Alert4Web.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ntag_summary = \"This detects the CIS ports by connecting to the server and\nprocessing the buffer received.\n\nCIS (COM+ Internet Services) are RPC over HTTP tunneling\nand requires IIS to operate.\nCIS ports shouldn't be visible on internet but only behind a firewall.\n\nIf you do not use this service, then disable it as it may become\na security threat in the future, if a vulnerability is discovered.\";\n\ntag_solution = \"Disable CIS with DCOMCNFG or protect CIS ports by a Firewall.\nhttp://support.microsoft.com/support/kb/articles/Q282/2/61.ASP\n\nFor more information about CIS:\nhttp://msdn.microsoft.com/library/en-us/dndcom/html/cis.asp\";\n\n\nif(description)\n{\n script_id(10761);\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:N\");\n script_version(\"$Revision: 8023 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)\");\n script_tag(name:\"cvss_base\", value:\"0.0\");\n name = \"Detect CIS ports\";\n script_name(name);\n \n\n \n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n \n script_copyright(\"This script is Copyright (C) 2001 Alert4Web.com\");\n family = \"Service detection\";\n script_family(family);\n script_dependencies(\"find_service.nasl\");\n script_require_ports(\"Services/ncacn_http\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\nport = get_kb_item(\"Services/ncacn_http\");\nif (!port)exit(0);\n\nkey = string(\"ncacn_http/banner/\", port);\nbanner = get_kb_item(key);\nif(banner)\n{\n data = string(\"There is a CIS (COM+ Internet Services) on this port\\nServer banner :\\n\", banner);\n log_message(port:port, data:data);\n}\n", "naslFamily": "Service detection"}