Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Useless services >> Daytime


Vulnerability Assessment Details

Daytime

Vulnerability Assessment Summary
Searches for the existence of daytime

Detailed Explanation for this Vulnerability Assessment

Summary :

A daytime service is running on the remote host

Description :

The remote host is running a 'daytime' service. This service
is designed to give the local time of the day of this host
to whoever connects to this port.

The date format issued by this service may sometimes help a possible hacker
to guess the operating system type of this host, or to set up
timed authentication attacks against the remote host.

In addition to that, the UDP version of daytime is running, a possible hacker
may link it to the echo port of a third party host using spoofing, thus
creating a possible denial of service condition between this host and
a third party.

Solution :

- Under Unix systems, comment out the 'daytime' line in /etc/inetd.conf
and restart the inetd process

- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpDaytime
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpDaytime

Then launch cmd.exe and type :

net stop simptcp
net start simptcp

To restart the service.

Network Security Threat Level:

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Dell R610 8-Core Server 2x E5540 2.53GHz 48GB
$146.0
Dell R610 8-Core Server 2x E5540 2.53GHz 48GB pictureDell R610 8-Core Server 2x E5540 2.53GHz 192GB 3x 300GB SAS Rails RPS
$921.0
Dell R610 8-Core Server 2x E5540 2.53GHz 192GB 3x 300GB SAS Rails RPS pictureHP RENEW DL360 G9 6-Core Server 1x E5-2620 v3 2.4GHz 24GB 2x 100GB Rails
$1955.0
HP RENEW DL360 G9 6-Core Server 1x E5-2620 v3 2.4GHz 24GB 2x 100GB Rails pictureHP DL360p G8 16-Core Server 2x E5-2690 2.9GHz 16GB 4x 146GB 15K SAS Rails RPS
$971.0
HP DL360p G8 16-Core Server 2x E5-2690 2.9GHz 16GB 4x 146GB 15K SAS Rails RPS picture


Discussions

No Discussions have been posted on this vulnerability.