|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Netware >> Netware NDS Object Enumeration Vulnerability Assessment Details
|
Netware NDS Object Enumeration |
||
Netware NDS Object Enumeration Detailed Explanation for this Vulnerability Assessment Summary : Remote directory server leaks information. Description : This host is a Novell Netware (eDirectory) server, and has browse rights on the PUBLIC object. It is possible to enumerate all NDS objects, including users, with crafted queries. A possible hacker can use this to gain information about this host. Solution : The NDS object PUBLIC should not have Browse rights the tree should be restricted to authenticated users only. Removing Browse rights from the object will fix this issue. If this is an external system it is recommended that access to port 524 be blocked from the Internet. Network Security Threat Level: Low / CVSS Base Score : 2 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N) Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Digital Defense, Inc |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |