Security Auditor's Research Assistant (SARA) ReportWriter

SARA Scan Results 10 May 2002
place document number here
 

SARA Scan Results of sara-data

 
INTRODUCTION
 

Advanced Research Corporation ® was tasked to perform a Security Auditor's Research Assistant (SARA) security scan on hosts on the sara-data sub-nets. The SARA scan was performed to identify potential security vulnerabilities in the sara-data sub-domain. The SARA scan was completed on 2002/05/10 and its scan mode was set to extreme. The version of SARA was Version 3.5.6b .

 
DISCUSSION
 
SARA is a third generation security analysis tool that analyzes network-based services on the target computers. SARA classifies a detected service in one of five categories:
 
 
A total of 3 devices were detected of which 2 are possibly vulnerable. Figure 1 summarizes this scan by color where the Green bar indicates hosts with no detected vulnerabilities. Grey indicates hosts with no services. The Red bar indicates hosts that have one or more red vulnerabilities. The Yellow bar indicates hosts that have one or more yellow vulnerabilities (but no red). And the Brown bar indicates hosts that have one or more brown problems (but no red or yellow)
 
Green 1
Grey 0
Red 2
Yellow 0
Brown 0

          Figure 1 Host Summary by Color

 
The SARA scan results are distributed as three appendices to this paper:
 

Host: fujitsu

General host information:



    

Vulnerability information:



Host: 192.168.1.1

General host information:



    

Vulnerability information:



END OF SECTION

Appendix D

Vulnerability List by Severity

  • 192.168.1.1:(Multiple IIS vulnerabilities (HTR ASP))

       

    Root Access via Buffer Overflow (RED)

       

    Target for Abuse(YELLOW)

       

    Possible Vulnerabilities (BROWN)


    END OF SECTION

    Appendix E

    Vulnerability Tutorials

    Tutorial: Potentially_Vulnerable_Web_Server.html




    Tutorial: rpc_statd_access.html




    Tutorial: sgi_fam_version.html




    Tutorial: SMTP_could_be_a_mail_relay.html




    Tutorial: SMTP_may_be_a_mail_relay.html




    Tutorial: SSH_vulnerabilities.html





    END OF SECTION