Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Service detection >> Timbuktu Detection


Vulnerability Assessment Details

Timbuktu Detection

Vulnerability Assessment Summary
Detect Timbuktu

Detailed Explanation for this Vulnerability Assessment

Summary :

A remote control service is running on the remote port.

Description :

Timbuktu Pro seems to be running on the remote host on this port.

Timbuktu Pro is a remote control tool which lets a remote user take
the control of the remote system (like the Terminal Services under Windows).

Make sure the use of this software is done in accordance with your corporate
security policy.

See also :

http://www.netopia.com

Solution :

If this service is not needed, disable it or filter incoming traffic
to this port. Otherwise make sure to use strong passwords for authentication.

Network Security Threat Level:

None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Hewlett Packard Model 2225C Vintage Inkjet Printer (REDUCED)
$22.0
Hewlett Packard Model 2225C Vintage Inkjet Printer (REDUCED) pictureCTX Vintage Computer Keyboard E8HKB-5911 Used Keyboard Yellowed Super Cool
$19.95
CTX Vintage Computer Keyboard E8HKB-5911 Used Keyboard Yellowed Super Cool pictureIMSI OptiMouse Mouse Systems Model M4 MSC Computer Parallel Cable Pad Vintage
$30.0
IMSI OptiMouse Mouse Systems Model M4 MSC Computer Parallel Cable Pad Vintage pictureVINTAGE Macintosh PowerBook 170 Laptop w/ Charger (German) and Bag 
$585.0
VINTAGE Macintosh PowerBook 170 Laptop w/ Charger (German) and Bag  picture


Discussions

No Discussions have been posted on this vulnerability.