![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.10942 |
Categoría: | Service detection |
Título: | Citrix Server Detection |
Resumen: | A Citrix server is running on this machine. |
Descripción: | Summary: A Citrix server is running on this machine. Vulnerability Insight: Citrix servers allow a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host). NOTE: by default the Citrix Server application utilizes a weak 40 bit obfuscation algorithm (not even a true encryption). If the default settings have not been changed, there already exists tools which can be used to passively ferret userIDs and passwords as they traverse a network. If this server is located within your DMZ, the risk is substantially higher, as Citrix necessarily requires access into the internal network for applications like SMB browsing, file sharing, email synchronization, etc. If an attacker gains a valid login and password, he may be able to use this service to gain further access on the remote host or remote network. This protocol has also been shown to be vulnerable to a man-in-the-middle attack. Solution: Disable this service if you do not use it. Also, make sure that the server is configured to utilize strong encryption. CVSS Score: 0.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:N |
Copyright | Copyright (C) 2005 John Lampe...j_lampe@bellsouth.net |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |