spaska.dobrich.net|discard (9/tcp)| spaska.dobrich.net|daytime (13/tcp)|10052|INFO|The daytime service is running.;The date format issued by this service;may sometimes help an attacker to guess;the operating system type. ;;In addition to that, when the UDP version of;daytime is running, an attacker may link it ;to the echo port using spoofing, thus creating;a possible denial of service.;;Solution : disable this service in /etc/inetd.conf.;;Risk factor : Low;CVE : CVE-1999-0103; spaska.dobrich.net|ssh (22/tcp)|10267|NOTE|Remote SSH version : ssh-2.0-openssh_3.4p1 debian 1:3.4p1-1 spaska.dobrich.net|ssh (22/tcp)| spaska.dobrich.net|time (37/tcp)| spaska.dobrich.net|www (80/tcp)|10107|NOTE|The remote web server type is :;;Apache/1.3.26 (Unix) Debian GNU/Linux PHP/4.1.2;;We recommend that you configure your web server to return;bogus versions, so that it makes the cracker job more difficult; spaska.dobrich.net|www (80/tcp)| spaska.dobrich.net|sunrpc (111/tcp)| spaska.dobrich.net|auth (113/tcp)|10021|INFO|The 'ident' service provides sensitives informations;to the intruders : it mainly says which accounts are running which;services. This helps attackers to focus on valuable services [those;owned by root]. If you don't use this service, disable it.;;Risk factor : Low.;;Solution : comment out the 'auth' or 'ident' line in /etc/inetd.conf;CVE : CAN-1999-0629; spaska.dobrich.net|https (443/tcp)| spaska.dobrich.net|mysql (3306/tcp)| spaska.dobrich.net|unknown (32768/tcp)| spaska.dobrich.net|general/tcp|10336|NOTE|Nmap found that this host is running Linux Kernel 2.4.0 - 2.4.17 (X86); spaska.dobrich.net|general/tcp| spaska.dobrich.net|unknown (32768/udp)|10235|INFO|;The statd RPC service is running. ;This service has a long history of ;security holes, so you should really;know what you are doing if you decide;to let it run.;;* NO SECURITY HOLE REGARDING THIS; PROGRAM HAVE BEEN TESTED, SO; THIS MIGHT BE A FALSE POSITIVE *;;We suggest you to disable this;service.;;;Risk factor : High;CVE : CVE-1999-0018; spaska.dobrich.net|general/icmp|10114|INFO|;The remote host answers to an ICMP timestamp;request. This allows an attacker to know the;date which is set on your machine. ;;This may help him to defeat all your ;time based authentifications protocols.;;Solution : filter out the icmp timestamp;requests (13), and the outgoing icmp ;timestamp replies (14).;;Risk factor : Low;CVE : CAN-1999-0524;