Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> Timbuktu Detection


Vulnerability Assessment Details

Timbuktu Detection

Vulnerability Assessment Summary
Detect Timbuktu

Detailed Explanation for this Vulnerability Assessment

Summary :

A remote control service is running on the remote port.

Description :

Timbuktu Pro seems to be running on the remote host on this port.

Timbuktu Pro is a remote control tool which lets a remote user take
the control of the remote system (like the Terminal Services under Windows).

Make sure the use of this software is done in accordance with your corporate
security policy.

See also :

http://www.netopia.com

Solution :

If this service is not needed, disable it or filter incoming traffic
to this port. Otherwise make sure to use strong passwords for authentication.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Acer TravelMate P256-M Intel Core i5-4210U CPU @ 1.70GHz (4 CPUs), ~2.4GHz
$150.0
Acer TravelMate P256-M Intel Core i5-4210U CPU @ 1.70GHz (4 CPUs), ~2.4GHz pictureASUS K53E Intel Pentium CPU Laptop *PARTS ONLY* -CZ
$39.99
ASUS K53E Intel Pentium CPU Laptop *PARTS ONLY* -CZ pictureIntel Core i5-4450 3.20GHz 4 Cores 4 Threads SR1QK Desktop CPU:
$75.0
Intel Core i5-4450 3.20GHz 4 Cores 4 Threads SR1QK Desktop CPU:   picturei5-2500K 2nd Gen 3.3 GHz 6MB Cache Processor SR008 Sandy Bridge
$45.0
i5-2500K 2nd Gen 3.3 GHz 6MB Cache Processor SR008 Sandy Bridge picture


Discussions

No Discussions have been posted on this vulnerability.