Ask the Community
Groups
Security: False Positives from Qualsys scan engine - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="summary"><strong>SUMMARY</strong></h3> <p>The Qualsys security software reports more false positives than other software, so typical responses are included.</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p></p> <table border="0" cellpadding="0" style="border-spacing: 0px; width: 928px;"><colgroup><col width="104"></col><col width="137"></col><col width="49"></col><col width="88"></col><col width="58"></col><col width="492"></col></colgroup><tbody><tr><td colspan="6" rowspan="1" style="height: 20px; width: 928px;">Sample Scan Results using Qualsys scan engine against a Unitrends system are shown below.<br> The Qualsys scan engine includes a list of 'potential' vulnerabilities (issues that might be typical for this type of system) but these have not been detected.</td></tr><tr><td colspan="6" rowspan="1" style="height: 20px;">Note that most of these vulnerabilities are false positives (no risk). Any vulnerabilities of Type 'Potential' are almost always incorrect on Linux distributions.</td></tr><tr><td colspan="6" rowspan="1" style="height: 20px;">*1= Any applicable vulnerabilities have been addressed in the security updates.<br> See Unitrends security KB for details at <a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Funitrends-support.zendesk.com%2Fhc%2Fen-us%2Farticles%2F360013271818">https://unitrends-support.zendesk.com/hc/en-us/articles/360013271818 </a> </td></tr><tr><td colspan="1" rowspan="1" style="height: 20px;"> </td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1"> </td> </tr></tbody></table><h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p></p> <table border="0" cellpadding="0" style="border-spacing: 0px; width: 1348px;"><colgroup><col width="104"></col><col width="137"></col><col width="49"></col><col width="88"></col><col width="58"></col><col width="492"></col><col width="160"></col><col width="260"></col></colgroup><tbody><tr><td colspan="1" rowspan="1" style="height: 20px; width: 104px;">OS</td> <td colspan="1" rowspan="1" style="width: 137px;">IP Status</td> <td colspan="1" rowspan="1" style="width: 49px;">QID</td> <td colspan="1" rowspan="1" style="width: 88px;">Type</td> <td colspan="1" rowspan="1" style="width: 58px;">Severity</td> <td colspan="1" rowspan="1" style="width: 492px;">Title</td> <td colspan="1" rowspan="1" style="width: 160px;">CVE ID</td> <td colspan="1" rowspan="1" style="width: 260px;">Unitrends Response</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">70003</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">4</td> <td colspan="1" rowspan="1">Null Session/Password NetBIOS Access</td> <td colspan="1" rowspan="1">CVE-1999-0519</td> <td colspan="1" rowspan="1">False positive. Only applies to Windows. See <a href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-1999-0519">https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0519</a></td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">11</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">Hidden RPC Services</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Negligible risk. Refer to this for a good explanation <a href="/home/leaving?allowTrusted=1&target=http%3A%2F%2Fwww.beyondsecurity.com%2Fscan_pentest_network_vulnerabilities_rpc_portmapper">http://www.beyondsecurity.com/scan_pentest_network_vulnerabilities_rpc_portmapper</a></td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38172</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">SSL Certificate - Improper Usage Vulnerability</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Certificate is known, however a <a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Funitrends-support.zendesk.com%2Fhc%2Fen-us%2Farticles%2F360013188477%3Fq%3DSELECT%2BId%252CDescription__c%252CResolution__c%252CLink_to_Advisories__c%252CNotes__c%252CSummary%252CCVE_ID__c%252CAttachment__Body__s%252CAttachment__ContentType__s%252CAttachment__Length__s%252CAttachment__Name__s%252CTitle%252CKnowledgeArticleId%2Bfrom%2BAdvisory__kav%2Bwhere%2BPublishStatus%253D%2527Online%2527">custom Certificate Authority</a> may be applied.</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38169</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">SSL Certificate - Self-Signed Certificate</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Certificate is known, however a <a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Funitrends-support.zendesk.com%2Fhc%2Fen-us%2Farticles%2F360013188477%3Fq%3DSELECT%2BId%252CDescription__c%252CResolution__c%252CLink_to_Advisories__c%252CNotes__c%252CSummary%252CCVE_ID__c%252CAttachment__Body__s%252CAttachment__ContentType__s%252CAttachment__Length__s%252CAttachment__Name__s%252CTitle%252CKnowledgeArticleId%2Bfrom%2BAdvisory__kav%2Bwhere%2BPublishStatus%253D%2527Online%2527">custom Certificate Authority</a> may be applied.</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38173</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">SSL Certificate - Signature Verification Failed Vulnerability</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Certificate is known, however a <a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Funitrends-support.zendesk.com%2Fhc%2Fen-us%2Farticles%2F360013188477%3Fq%3DSELECT%2BId%252CDescription__c%252CResolution__c%252CLink_to_Advisories__c%252CNotes__c%252CSummary%252CCVE_ID__c%252CAttachment__Body__s%252CAttachment__ContentType__s%252CAttachment__Length__s%252CAttachment__Name__s%252CTitle%252CKnowledgeArticleId%2Bfrom%2BAdvisory__kav%2Bwhere%2BPublishStatus%253D%2527Online%2527">custom Certificate Authority</a> may be applied.</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38170</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">SSL Certificate - Subject Common Name Does Not Match Server FQDN</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Certificate is known, however a <a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Funitrends-support.zendesk.com%2Fhc%2Fen-us%2Farticles%2F360013188477%3Fq%3DSELECT%2BId%252CDescription__c%252CResolution__c%252CLink_to_Advisories__c%252CNotes__c%252CSummary%252CCVE_ID__c%252CAttachment__Body__s%252CAttachment__ContentType__s%252CAttachment__Length__s%252CAttachment__Name__s%252CTitle%252CKnowledgeArticleId%2Bfrom%2BAdvisory__kav%2Bwhere%2BPublishStatus%253D%2527Online%2527">custom Certificate Authority</a> may be applied.</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">82024</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">UDP Constant IP Identification Field Fingerprinting Vulnerability</td> <td colspan="1" rowspan="1">CVE-2002-0510</td> <td colspan="1" rowspan="1">No risk. See Red Hat statement at <a href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fweb.nvd.nist.gov%2Fview%2Fvuln%2Fdetail%3FvulnId%3DCVE-2002-0510">https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0510</a></td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">70001</td> <td colspan="1" rowspan="1">Vuln</td> <td align="right" colspan="1" rowspan="1">1</td> <td colspan="1" rowspan="1">NetBIOS Shared Folder List Available</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">False positive. Only applicable to Windows servers (as described in the scan report).</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">105666</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">5</td> <td colspan="1" rowspan="1">EOL/Obsolete Software: Samba 3.x Detected</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">70075</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">5</td> <td colspan="1" rowspan="1">Samba "TALLOC_FREE" Funtion Remote Code Execution Vulnerability</td> <td colspan="1" rowspan="1">CVE-2015-0240</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">66040</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">5</td> <td colspan="1" rowspan="1">Statd Format Bug Vulnerability</td> <td colspan="1" rowspan="1">CVE-2000-0666, CVE-2000-0800</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">86490</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">4</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.2.29 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2014-0231, CVE-2013-5704, CVE-2014-0118, CVE-2014-0226</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">86490</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">4</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.2.29 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2014-0231, CVE-2013-5704, CVE-2014-0118, CVE-2014-0226</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">12500</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server APR "apr_fnmatch()" Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2011-0419</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">86908</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server mod_cache and mod_dav Undisclosed DoS Vulnerability</td> <td colspan="1" rowspan="1">CVE-2010-1452</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">12529</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server mod_proxy_ajp Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2011-3348</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87242</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Multiple Denial of Service Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2012-4557, CVE-2012-0021</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87242</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Multiple Denial of Service Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2012-4557, CVE-2012-0021</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87133</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.2.23/2.4.2 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2012-2687, CVE-2012-0883</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87233</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.2.25 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2013-1896, CVE-2013-1862</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87233</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.2.25 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2013-1896, CVE-2013-1862</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">86172</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">86172</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache HTTP Server Prior to 2.4.16/2.2.31 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2015-0228, CVE-2015-0253, CVE-2015-3183, CVE-2015-3185</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87156</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache Prior to 2.4.4 and 2.2.24 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2012-3499, CVE-2012-4558</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">87156</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Apache Prior to 2.4.4 and 2.2.24 Multiple Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2012-3499, CVE-2012-4558</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">42382</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenSSH Commands Information Disclosure Vulnerability</td> <td colspan="1" rowspan="1">CVE-2012-0814</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">42384</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenSSH J-PAKE Session Key Retrieval Vulnerability</td> <td colspan="1" rowspan="1">CVE-2010-4478</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">42413</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenSSH LoginGraceTime Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2010-5107</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38623</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenSSH Xauth Command Injection Vulnerability</td> <td colspan="1" rowspan="1">CVE-2016-3115</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38467</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenVPN Failed Authentication Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2005-2531</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38464</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenVPN MAC Address Spoofing Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2005-2533</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38463</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenVPN Packet Decryption Failure Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2005-2532</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">38465</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">OpenVPN Same Client Certificate Denial of Service Vulnerability</td> <td colspan="1" rowspan="1">CVE-2005-2534</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">70071</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Samba Denial of Service Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2014-0244, CVE-2014-3493</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">70076</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">3</td> <td colspan="1" rowspan="1">Samba Multiple Vulnerabilities (BADLOCK)</td> <td colspan="1" rowspan="1">CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112, CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">86920</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">Apache HTTP Server APR-util Multiple Denial of Service Vulnerabilities</td> <td colspan="1" rowspan="1">CVE-2009-3560, CVE-2009-3720, CVE-2010-1623</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">19568</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">Database Instance Detected</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">42428</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">OpenSSH "child_set_env()" Security Bypass Issue</td> <td colspan="1" rowspan="1">CVE-2014-2532</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">70073</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">Samba Uninitialized Memory Exposure Vulnerability</td> <td colspan="1" rowspan="1">CVE-2014-0178</td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr><tr><td colspan="1" rowspan="1" style="height: 20px;">Ubuntu / Linux 2.6.x</td> <td colspan="1" rowspan="1">host scanned, found vuln</td> <td align="right" colspan="1" rowspan="1">90043</td> <td colspan="1" rowspan="1">Potential</td> <td align="right" colspan="1" rowspan="1">2</td> <td colspan="1" rowspan="1">SMB Signing Disabled or SMB Signing Not Required</td> <td colspan="1" rowspan="1"> </td> <td colspan="1" rowspan="1">Potential, but No risk. See KB *1</td> </tr></tbody></table><h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul></ul> </article> </main>