Nessus Report

Report generated by Nessus™

sierra

Tue, 26 Jun 2018 08:57:41 WIB

TABLE OF CONTENTS
Vulnerabilities by Host
172.16.0.4
0
19
12
0
79
Critical
High
Medium
Low
Info
Scan Information
Start time: Tue Jun 26 08:48:56 2018
End time: Tue Jun 26 08:57:41 2018
Host Information
DNS Name: siakad.poltekom.ac.id
Netbios Name: SIERRA
IP: 172.16.0.4
MAC Address: 3c:d9:2b:fe:7e:3e 3c:d9:2b:fe:7e:3f
OS: Linux Kernel 4.4.0-112-generic on Ubuntu 16.04
Vulnerabilities

10114 - ICMP Timestamp Request Remote Date Disclosure
Synopsis
It is possible to determine the exact time set on the remote host.
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
None
References
CVE CVE-1999-0524
XREF OSVDB:94
XREF CWE:200
Plugin Information:
Published: 1999/08/01, Modified: 2012/06/18
Plugin Output

icmp/0

The difference between the local and remote clocks is 44 seconds.

106972 - Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3582-1) (Spectre)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Mohamed Ghannam discovered that the IPv4 raw socket implementation in the Linux kernel contained a race condition leading to uninitialized pointer usage. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2017-17712)

Laurent Guerby discovered that the mbcache feature in the ext2 and ext4 filesystems in the Linux kernel improperly handled xattr block caching. A local attacker could use this to cause a denial of service.
(CVE-2015-8952)

Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel did not properly track reference counts when merging buffers. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2017-12190)

ChunYu Wang discovered that a use-after-free vulnerability existed in the SCTP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code, (CVE-2017-15115)

Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-8824)

USN-3540-1 mitigated CVE-2017-5715 (Spectre Variant 2) for the amd64 architecture in Ubuntu 16.04 LTS. This update provides the compiler-based retpoline kernel mitigation for the amd64 and i386 architectures.

Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS v3.0 Base Score
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
7.0 (CVSS:3.0/E:P/RL:O/RC:X)
CVSS Base Score
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
5.6 (CVSS2#E:POC/RL:OF/RC:ND)
STIG Severity
I
References
CVE CVE-2015-8952
CVE CVE-2017-12190
CVE CVE-2017-15115
CVE CVE-2017-17712
CVE CVE-2017-5715
CVE CVE-2017-8824
XREF OSVDB:143515
XREF OSVDB:167117
XREF OSVDB:169396
XREF OSVDB:170325
XREF OSVDB:171084
XREF OSVDB:171897
XREF USN:3582-1
XREF IAVA:2018-A-0020
Plugin Information:
Published: 2018/02/23, Modified: 2018/02/26
Plugin Output

tcp/0


- Installed package : linux-image-4.4.0-112-generic_4.4.0-112.135
Fixed package : linux-image-4.4.0-116-generic_4.4.0-116.140

- Installed package : linux-image-generic_4.4.0.112.118
Fixed package : linux-image-generic_4.4.0.116.122
107117 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : isc-dhcp vulnerabilities (USN-3586-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Konstantin Orekhov discovered that the DHCP server incorrectly handled a large number of concurrent TCP sessions. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-2774)

It was discovered that the DHCP server incorrectly handled socket descriptors. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2017-3144)

Felix Wilhelm discovered that the DHCP client incorrectly handled certain malformed responses. A remote attacker could use this issue to cause the DHCP client to crash, resulting in a denial of service, or possibly execute arbitrary code. In the default installation, attackers would be isolated by the dhclient AppArmor profile.
(CVE-2018-5732)

Felix Wilhelm discovered that the DHCP server incorrectly handled reference counting. A remote attacker could possibly use this issue to cause the DHCP server to crash, resulting in a denial of service.
(CVE-2018-5733).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Base Score
7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
STIG Severity
I
References
CVE CVE-2016-2774
CVE CVE-2017-3144
CVE CVE-2018-5732
CVE CVE-2018-5733
XREF USN:3586-1
XREF IAVB:2018-B-0034
Plugin Information:
Published: 2018/03/02
Plugin Output

tcp/0


- Installed package : isc-dhcp-client_4.3.3-5ubuntu12.7
Fixed package : isc-dhcp-client_4.3.3-5ubuntu12.9
108403 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : curl vulnerabilities (USN-3598-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Phan Thanh discovered that curl incorrectly handled certain FTP paths.
An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2018-1000120)

Dario Weisser discovered that curl incorrectly handled certain LDAP URLs. An attacker could possibly use this issue to cause a denial of service. (CVE-2018-1000121)

Max Dymond discovered that curl incorrectly handled certain RTSP data.
An attacker could possibly use this to cause a denial of service or even to get access to sensitive data. (CVE-2018-1000122).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
CVE CVE-2018-1000120
CVE CVE-2018-1000121
CVE CVE-2018-1000122
XREF USN:3598-1
Plugin Information:
Published: 2018/03/16, Modified: 2018/04/10
Plugin Output

tcp/0


- Installed package : curl_7.47.0-1ubuntu2.6
Fixed package : curl_7.47.0-1ubuntu2.7

- Installed package : libcurl3-gnutls_7.47.0-1ubuntu2.6
Fixed package : libcurl3-gnutls_7.47.0-1ubuntu2.7
108657 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : tiff vulnerabilities (USN-3606-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libtiff-tools and / or libtiff5 packages.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
Plugin Information:
Published: 2018/03/27, Modified: 2018/03/27
Plugin Output

tcp/0


- Installed package : libtiff5_4.0.6-1ubuntu0.2
Fixed package : libtiff5_4.0.6-1ubuntu0.4
108708 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : icu vulnerability (USN-3610-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
It was discovered that ICU incorrectly handled certain calendars. If an application using ICU processed crafted data, a remote attacker could possibly cause it to crash, leading to a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libicu52, libicu55 and / or libicu57 packages.
Risk Factor
High
References
CVE CVE-2017-15422
XREF USN:3610-1
Plugin Information:
Published: 2018/03/29, Modified: 2018/03/29
Plugin Output

tcp/0


- Installed package : libicu55_55.1-7ubuntu0.3
Fixed package : libicu55_55.1-7ubuntu0.4
108842 - Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3619-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2017-16995)

It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861)

It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407)

It was discovered that an information disclosure vulnerability existed in the ACPI implementation of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory addresses).
(CVE-2017-11472)

It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129)

It was discovered that the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel contained a use-after-free when handling device removal. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16528)

Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532)

Andrey Konovalov discovered that the Conexant cx231xx USB video capture driver in the Linux kernel did not properly validate interface descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16536)

Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537)

Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645)

Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646)

Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash).
(CVE-2017-16649)

Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash).
(CVE-2017-16650)

It was discovered that the USB Virtual Host Controller Interface (VHCI) driver in the Linux kernel contained an information disclosure vulnerability. A physically proximate attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16911)

It was discovered that the USB over IP implementation in the Linux kernel did not validate endpoint numbers. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16912)

It was discovered that the USB over IP implementation in the Linux kernel did not properly validate CMD_SUBMIT packets. A remote attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2017-16913)

It was discovered that the USB over IP implementation in the Linux kernel contained a NULL pointer dereference error. A remote attacker could use this to cause a denial of service (system crash).
(CVE-2017-16914)

It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory).
(CVE-2017-16994)

It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions.
(CVE-2017-17448)

It was discovered that the netlink subsystem in the Linux kernel did not properly restrict observations of netlink messages to the appropriate net namespace. A local attacker could use this to expose sensitive information (kernel netlink traffic). (CVE-2017-17449)

It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450)

It was discovered that the core USB subsystem in the Linux kernel did not validate the number of configurations and interfaces in a device.
A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-17558)

Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information.
(CVE-2017-17741)

It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805)

It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806)

It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a task's' default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807)

Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel contained a branch-pruning logic issue around unreachable code. A local attacker could use this to cause a denial of service. (CVE-2017-17862)

It was discovered that the parallel cryptography component of the Linux kernel incorrectly freed kernel memory. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18075)

It was discovered that a race condition existed in the Device Mapper component of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18203)

It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204)

It was discovered that an infinite loop could occur in the the madvise(2) implementation in the Linux kernel in certain circumstances. A local attacker could use this to cause a denial of service (system hang). (CVE-2017-18208)

Andy Lutomirski discovered that the KVM implementation in the Linux kernel was vulnerable to a debug exception error when single-stepping through a syscall. A local attacker in a non-Linux guest vm could possibly use this to gain administrative privileges in the guest vm.
(CVE-2017-7518)

It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026)

It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds write during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2018-5332)

Mohamed Ghannam discovered a NULL pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333)

Fan Long Fei discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344)

It was discovered that an integer overflow error existed in the futex implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-6927)

It was discovered that a NULL pointer dereference existed in the RDS (Reliable Datagram Sockets) protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-7492)

It was discovered that the Broadcom UniMAC MDIO bus controller driver in the Linux kernel did not properly validate device resources. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-8043).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS v3.0 Base Score
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Base Score
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
References
Plugin Information:
Published: 2018/04/05, Modified: 2018/04/05
Plugin Output

tcp/0


- Installed package : linux-image-4.4.0-112-generic_4.4.0-112.135
Fixed package : linux-image-4.4.0-119-generic_4.4.0-119.143

- Installed package : linux-image-generic_4.4.0.112.118
Fixed package : linux-image-generic_4.4.0.119.125
108951 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : ubuntu-release-upgrader vulnerability (USN-3623-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
It was discovered that ubuntu-release-upgrader did not correctly drop permissions before opening a browser to view the release notes. This update fixes the issue.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected python3-distupgrade package.
Risk Factor
High
References
XREF USN:3623-1
Plugin Information:
Published: 2018/04/10, Modified: 2018/04/10
Plugin Output

tcp/0


- Installed package : python3-distupgrade_1:16.04.23
Fixed package : python3-distupgrade_1:16.04.25
109086 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : perl vulnerabilities (USN-3625-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
It was discovered that Perl incorrectly handled certain regular expressions. An attacker could possibly use this issue to cause Perl to hang, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-8853)

It was discovered that Perl incorrectly loaded libraries from the current working directory. A local attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-6185)

It was discovered that Perl incorrectly handled the rmtree and remove_tree functions. A local attacker could possibly use this issue to set the mode on arbitrary files. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2017-6512)

Brian Carpenter discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue has only been addressed in Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6797)

Nguyen Duc Manh discovered that Perl incorrectly handled certain regular expressions. An attacker could use this issue to cause Perl to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 17.10. (CVE-2018-6798)

GwanYeong Kim discovered that Perl incorrectly handled certain data when using the pack function. An attacker could use this issue to cause Perl to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-6913).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected perl package.
Risk Factor
High
CVSS v3.0 Base Score
7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
Plugin Information:
Published: 2018/04/17, Modified: 2018/05/23
Plugin Output

tcp/0


- Installed package : perl_5.22.1-9ubuntu0.2
Fixed package : perl_5.22.1-9ubuntu0.3
109314 - Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3631-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
It was discovered that a buffer overread vulnerability existed in the keyring subsystem of the Linux kernel. A local attacker could possibly use this to expose sensitive information (kernel memory).
(CVE-2017-13305)

It was discovered that the DM04/QQBOX USB driver in the Linux kernel did not properly handle device attachment and warm-start. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16538)

Luo Quan and Wei Yang discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) subsystem of the Linux kernel when handling ioctl()s. A local attacker could use this to cause a denial of service (system deadlock). (CVE-2018-1000004)

Wang Qize discovered that an information disclosure vulnerability existed in the SMBus driver for ACPI Embedded Controllers in the Linux kernel. A local attacker could use this to expose sensitive information (kernel pointer addresses). (CVE-2018-5750)

Fan Long Fei discovered that a race condition existed in the Advanced Linux Sound Architecture (ALSA) subsystem of the Linux kernel that could lead to a use-after-free or an out-of-bounds buffer access. A local attacker with access to /dev/snd/seq could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2018-7566).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS v3.0 Base Score
6.6 (CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVSS Base Score
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
References
Plugin Information:
Published: 2018/04/24, Modified: 2018/04/24
Plugin Output

tcp/0


- Installed package : linux-image-4.4.0-112-generic_4.4.0-112.135
Fixed package : linux-image-4.4.0-121-generic_4.4.0-121.145

- Installed package : linux-image-generic_4.4.0.112.118
Fixed package : linux-image-generic_4.4.0.121.127
109650 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : linux, linux-aws, linux-azure, linux-euclid, linux-gcp, linux-hwe, (USN-3641-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Nick Peterson discovered that the Linux kernel did not properly handle debug exceptions following a MOV/POP to SS instruction. A local attacker could use this to cause a denial of service (system crash).
This issue only affected the amd64 architecture. (CVE-2018-8897)

Andy Lutomirski discovered that the KVM subsystem of the Linux kernel did not properly emulate the ICEBP instruction following a MOV/POP to SS instruction. A local attacker in a KVM virtual machine could use this to cause a denial of service (guest VM crash) or possibly escalate privileges inside of the virtual machine. This issue only affected the i386 and amd64 architectures. (CVE-2018-1087)

Andy Lutomirski discovered that the Linux kernel did not properly perform error handling on virtualized debug registers. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-1000199).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS Base Score
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
References
CVE CVE-2018-1000199
CVE CVE-2018-1087
CVE CVE-2018-8897
XREF USN:3641-1
Plugin Information:
Published: 2018/05/09, Modified: 2018/06/21
Plugin Output

tcp/0


- Installed package : linux-image-4.4.0-112-generic_4.4.0-112.135
Fixed package : linux-image-4.4.0-124-generic_4.4.0-124.148

- Installed package : linux-image-generic_4.4.0.112.118
Fixed package : linux-image-generic_4.4.0.124.130
109893 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : curl vulnerabilities (USN-3648-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Dario Weisser discovered that curl incorrectly handled long FTP server command replies. If a user or automated system were tricked into connecting to a malicious FTP server, a remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2018-1000300)

Max Dymond discovered that curl incorrectly handled certain RTSP responses. If a user or automated system were tricked into connecting to a malicious server, a remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2018-1000301).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
References
CVE CVE-2018-1000300
CVE CVE-2018-1000301
CVE CVE-2018-1000303
XREF USN:3648-1
Plugin Information:
Published: 2018/05/17, Modified: 2018/05/17
Plugin Output

tcp/0


- Installed package : curl_7.47.0-1ubuntu2.6
Fixed package : curl_7.47.0-1ubuntu2.8

- Installed package : libcurl3-gnutls_7.47.0-1ubuntu2.6
Fixed package : libcurl3-gnutls_7.47.0-1ubuntu2.8
110048 - Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, vulnerabilities (USN-3654-1) (Spectre)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Jann Horn and Ken Johnson discovered that microprocessors utilizing speculative execution of a memory read may allow unauthorized memory reads via a sidechannel attack. This flaw is known as Spectre Variant 4. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2018-3639)

Tuba Yavuz discovered that a double-free error existed in the USBTV007 driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2017-17975)

It was discovered that a race condition existed in the F2FS implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18193)

It was discovered that a buffer overflow existed in the Hisilicon HNS Ethernet Device driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18222)

It was discovered that the netfilter subsystem in the Linux kernel did not validate that rules containing jumps contained user-defined chains. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-1065)

It was discovered that the netfilter subsystem of the Linux kernel did not properly validate ebtables offsets. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-1068)

It was discovered that a NULL pointer dereference vulnerability existed in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-1130)

It was discovered that the SCTP Protocol implementation in the Linux kernel did not properly validate userspace provided payload lengths in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5803)

It was discovered that a double free error existed in the block layer subsystem of the Linux kernel when setting up a request queue. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-7480)

It was discovered that a memory leak existed in the SAS driver subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2018-7757)

It was discovered that a race condition existed in the x86 machine check handler in the Linux kernel. A local privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-7995)

Eyal Itkin discovered that the USB displaylink video adapter driver in the Linux kernel did not properly validate mmap offsets sent from userspace. A local attacker could use this to expose sensitive information (kernel memory) or possibly execute arbitrary code.
(CVE-2018-8781)

Silvio Cesare discovered a buffer overwrite existed in the NCPFS implementation in the Linux kernel. A remote attacker controlling a malicious NCPFS server could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-8822).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS v3.0 Base Score
5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CVSS Base Score
7.2 (CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
References
Plugin Information:
Published: 2018/05/23, Modified: 2018/05/29
Plugin Output

tcp/0


- Installed package : linux-image-4.4.0-112-generic_4.4.0-112.135
Fixed package : linux-image-4.4.0-127-generic_4.4.0-127.153

- Installed package : linux-image-generic_4.4.0.112.118
Fixed package : linux-image-generic_4.4.0.127.133
110094 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : procps vulnerabilities (USN-3658-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
It was discovered that the procps-ng top utility incorrectly read its configuration file from the current working directory. A local attacker could possibly use this issue to escalate privileges.
(CVE-2018-1122)

It was discovered that the procps-ng ps tool incorrectly handled memory. A local user could possibly use this issue to cause a denial of service. (CVE-2018-1123)

It was discovered that libprocps incorrectly handled the file2strvec() function. A local attacker could possibly use this to execute arbitrary code. (CVE-2018-1124)

It was discovered that the procps-ng pgrep utility incorrectly handled memory. A local attacker could possibly use this issue to cause de denial of service. (CVE-2018-1125)

It was discovered that procps-ng incorrectly handled memory. A local attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2018-1126).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
STIG Severity
II
References
CVE CVE-2018-1122
CVE CVE-2018-1123
CVE CVE-2018-1124
CVE CVE-2018-1125
CVE CVE-2018-1126
XREF USN:3658-1
XREF IAVA:2018-A-0174
Plugin Information:
Published: 2018/05/24, Modified: 2018/06/07
Plugin Output

tcp/0


- Installed package : libprocps4_2:3.3.10-4ubuntu2.3
Fixed package : libprocps4_2:3.3.10-4ubuntu2.4

- Installed package : procps_2:3.3.10-4ubuntu2.3
Fixed package : procps_2:3.3.10-4ubuntu2.4
110263 - Ubuntu 16.04 LTS / 17.10 / 18.04 LTS : apport vulnerability (USN-3664-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
Sander Bos discovered that Apport incorrectly handled core dumps when certain files are missing from /proc. A local attacker could possibly use this issue to cause a denial of service, gain root privileges, or escape from containers.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected apport package.
Risk Factor
High
References
CVE CVE-2018-6552
XREF USN:3664-1
Plugin Information:
Published: 2018/05/31, Modified: 2018/05/31
Plugin Output

tcp/0


- Installed package : apport_2.20.1-0ubuntu2.15
Fixed package : apport_2.20.1-0ubuntu2.18
110395 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : git vulnerabilities (USN-3671-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
Etienne Stalmans discovered that git did not properly validate git submodules files. A remote attacker could possibly use this to craft a git repo that causes arbitrary code execution when 'git clone
--recurse-submodules' is used. (CVE-2018-11235)

It was discovered that an integer overflow existed in git's pathname sanity checking code when used on NTFS filesystems. An attacker could use this to cause a denial of service or expose sensitive information.
(CVE-2018-11233).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected git package.
Risk Factor
High
References
CVE CVE-2018-11233
CVE CVE-2018-11235
XREF USN:3671-1
Plugin Information:
Published: 2018/06/07, Modified: 2018/06/07
Plugin Output

tcp/0


- Installed package : git_1:2.7.4-0ubuntu1.3
Fixed package : git_1:2.7.4-0ubuntu1.4
110476 - Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3676-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly handle corrupted meta data in some situations.
An attacker could use this to specially craft an ext4 file system that caused a denial of service (system crash) when mounted.
(CVE-2018-1092, CVE-2018-1093)

It was discovered that the cdrom driver in the Linux kernel contained an incorrect bounds check. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-10940)

It was discovered that the 802.11 software simulator implementation in the Linux kernel contained a memory leak when handling certain error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2018-8087).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
High
CVSS Base Score
7.1 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
References
CVE CVE-2018-1092
CVE CVE-2018-1093
CVE CVE-2018-10940
CVE CVE-2018-8087
XREF USN:3676-1
Plugin Information:
Published: 2018/06/12, Modified: 2018/06/12
Plugin Output

tcp/0


- Installed package : linux-image-4.4.0-112-generic_4.4.0-112.135
Fixed package : linux-image-4.4.0-128-generic_4.4.0-128.154

- Installed package : linux-image-generic_4.4.0.112.118
Fixed package : linux-image-generic_4.4.0.128.134
110533 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : perl vulnerability (USN-3684-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
It was discovered that Perl incorrectly handled certain archive files.
An attacker could possibly use this to overwrite arbitrary files.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected perl package.
Risk Factor
High
References
CVE CVE-2018-12015
XREF USN:3684-1
Plugin Information:
Published: 2018/06/14, Modified: 2018/06/14
Plugin Output

tcp/0


- Installed package : perl_5.22.1-9ubuntu0.2
Fixed package : perl_5.22.1-9ubuntu0.5
110552 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : file vulnerabilities (USN-3686-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Alexander Cherepanov discovered that file incorrectly handled a large number of notes. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9620)

Alexander Cherepanov discovered that file incorrectly handled certain long strings. An attacker could use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9620)

Alexander Cherepanov discovered that file incorrectly handled certain malformed ELF files. An attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2014-9653)

It was discovered that file incorrectly handled certain magic files.
An attacker could use this issue with a specially crafted magic file to cause a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. (CVE-2015-8865)

It was discovered that file incorrectly handled certain malformed ELF files. An attacker could use this issue to cause a denial of service.
(CVE-2018-10360).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected file and / or libmagic1 packages.
Risk Factor
High
CVSS v3.0 Base Score
7.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
CVSS Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
Plugin Information:
Published: 2018/06/15, Modified: 2018/06/15
Plugin Output

tcp/0


- Installed package : file_1:5.25-2ubuntu1
Fixed package : file_1:5.25-2ubuntu1.1

- Installed package : libmagic1_1:5.25-2ubuntu1
Fixed package : libmagic1_1:5.25-2ubuntu1.1
110623 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libgcrypt11, libgcrypt20 vulnerability (USN-3689-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Keegan Ryan discovered that Libgcrypt was susceptible to a side-channel attack. A local attacker could possibly use this attack to recover ECDSA private keys.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libgcrypt11 and / or libgcrypt20 packages.
Risk Factor
High
References
CVE CVE-2018-0495
XREF USN:3689-1
Plugin Information:
Published: 2018/06/20, Modified: 2018/06/20
Plugin Output

tcp/0


- Installed package : libgcrypt20_1.6.5-2ubuntu0.3
Fixed package : libgcrypt20_1.6.5-2ubuntu0.5
107023 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : sensible-utils vulnerability (USN-3584-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
Gabriel Corona discovered that sensible-utils incorrectly validated strings when launcher a browser with the sensible-browser tool. A remote attacker could possibly use this issue with a specially crafted URL to conduct an argument injection attack and execute arbitrary code.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected sensible-utils package.
Risk Factor
Medium
CVSS v3.0 Base Score
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
References
CVE CVE-2017-17512
XREF USN:3584-1
Plugin Information:
Published: 2018/02/27
Plugin Output

tcp/0


- Installed package : sensible-utils_0.0.9
Fixed package : sensible-utils_0.0.9ubuntu0.16.04.1
108335 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : samba vulnerabilities (USN-3595-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Bjorn Baumbach discovered that Samba incorrectly validated permissions when changing account passwords via LDAP. An authenticated attacker could use this issue to change the password of other users, including administrators, and perform actions as those users.
(CVE-2018-1057)

It was discovered that Samba incorrectly validated inputs to the RPC spoolss service. An authenticated attacker could use this issue to cause the service to crash, resulting in a denial of service.
(CVE-2018-1050).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected samba and / or samba-dsdb-modules packages.
Risk Factor
Medium
CVSS Base Score
6.5 (CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
References
CVE CVE-2018-1050
CVE CVE-2018-1057
XREF USN:3595-1
Plugin Information:
Published: 2018/03/14, Modified: 2018/04/16
Plugin Output

tcp/0


- Installed package : samba_2:4.3.11+dfsg-0ubuntu0.16.04.12
Fixed package : samba_2:4.3.11+dfsg-0ubuntu0.16.04.13

- Installed package : samba-dsdb-modules_2:4.3.11+dfsg-0ubuntu0.16.04.12
Fixed package : samba-dsdb-modules_2:4.3.11+dfsg-0ubuntu0.16.04.13
108513 - Ubuntu 14.04 LTS / 16.04 LTS : tiff vulnerabilities (USN-3602-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
It was discovered that LibTIFF incorrectly handled certain malformed images. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libtiff-tools and / or libtiff5 packages.
Risk Factor
Medium
CVSS v3.0 Base Score
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
References
Plugin Information:
Published: 2018/03/21, Modified: 2018/03/21
Plugin Output

tcp/0


- Installed package : libtiff5_4.0.6-1ubuntu0.2
Fixed package : libtiff5_4.0.6-1ubuntu0.3
108709 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : openssl vulnerability (USN-3611-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
It was discovered that OpenSSL incorrectly handled certain ASN.1 types. A remote attacker could possibly use this issue to cause a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libssl1.0.0 package.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
References
CVE CVE-2018-0739
XREF USN:3611-1
Plugin Information:
Published: 2018/03/29, Modified: 2018/04/25
Plugin Output

tcp/0


- Installed package : libssl1.0.0_1.0.2g-1ubuntu4.10
Fixed package : libssl1.0.0_1.0.2g-1ubuntu4.11
108833 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : python-crypto vulnerability (USN-3616-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected python-crypto and / or python3-crypto packages.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
CVE CVE-2018-6594
XREF USN:3616-1
Plugin Information:
Published: 2018/04/04, Modified: 2018/04/04
Plugin Output

tcp/0


- Installed package : python-crypto_2.6.1-6ubuntu0.16.04.2
Fixed package : python-crypto_2.6.1-6ubuntu0.16.04.3
109002 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : patch vulnerabilities (USN-3624-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
It was discovered that Patch incorrectly handled certain files. An attacker could possibly use this to cause a denial of service.
(CVE-2016-10713)

It was discovered that Patch incorrectly handled certain input validation. An attacker could possibly use this to execute arbitrary code. (CVE-2018-1000156)

It was discovered that Patch incorrectly handled certain inputs. An attacker could possibly use this to cause a denial of service.
(CVE-2018-6951).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected patch package.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVSS Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
References
CVE CVE-2016-10713
CVE CVE-2018-1000156
CVE CVE-2018-6951
XREF USN:3624-1
Plugin Information:
Published: 2018/04/11, Modified: 2018/05/16
Plugin Output

tcp/0


- Installed package : patch_2.7.5-1
Fixed package : patch_2.7.5-1ubuntu0.16.04.1
109200 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : openssl vulnerability (USN-3628-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key generation. An attacker could possibly use this issue to perform a cache-timing attack and recover private RSA keys.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected libssl1.0.0 package.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
References
CVE CVE-2018-0737
XREF USN:3628-1
Plugin Information:
Published: 2018/04/20, Modified: 2018/05/24
Plugin Output

tcp/0


- Installed package : libssl1.0.0_1.0.2g-1ubuntu4.10
Fixed package : libssl1.0.0_1.0.2g-1ubuntu4.12
109681 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : wget vulnerability (USN-3643-1)
Synopsis
The remote Ubuntu host is missing a security-related patch.
Description
It was discovered that Wget incorrectly handled certain inputs. An attacker could possibly use this to inject arbitrary cookie values.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected wget package.
Risk Factor
Medium
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
References
CVE CVE-2018-0494
XREF USN:3643-1
Plugin Information:
Published: 2018/05/10, Modified: 2018/06/13
Plugin Output

tcp/0


- Installed package : wget_1.17.1-1ubuntu1.3
Fixed package : wget_1.17.1-1ubuntu1.4
110382 - Ubuntu 14.04 LTS / 16.04 LTS : elfutils vulnerabilities (USN-3670-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Agostino Sarubbo discovered that elfutils incorrectly handled certain malformed ELF files. If a user or automated system were tricked into processing a specially crafted ELF file, elfutils could be made to crash or consume resources, resulting in a denial of service.

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected packages.
Risk Factor
Medium
CVSS v3.0 Base Score
5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
CVSS Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)
References
Plugin Information:
Published: 2018/06/06, Modified: 2018/06/06
Plugin Output

tcp/0


- Installed package : libelf1_0.165-3ubuntu1
Fixed package : libelf1_0.165-3ubuntu1.1
110475 - Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : gnupg, gnupg2 vulnerabilities (USN-3675-1)
Synopsis
The remote Ubuntu host is missing one or more security-related patches.
Description
Marcus Brinkmann discovered that during decryption or verification, GnuPG did not properly filter out terminal sequences when reporting the original filename. An attacker could use this to specially craft a file that would cause an application parsing GnuPG output to incorrectly interpret the status of the cryptographic operation reported by GnuPG. (CVE-2018-12020)

Lance Vick discovered that GnuPG did not enforce configurations where key certification required an offline master Certify key. An attacker with access to a signing subkey could generate certifications that appeared to be valid. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-9234).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected gnupg and / or gpg packages.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
STIG Severity
I
References
CVE CVE-2018-12020
CVE CVE-2018-9234
XREF USN:3675-1
XREF IAVA:2018-A-0193
Plugin Information:
Published: 2018/06/12, Modified: 2018/06/21
Plugin Output

tcp/0


- Installed package : gnupg_1.4.20-1ubuntu3.1
Fixed package : gnupg_1.4.20-1ubuntu3.2
11936 - OS Identification
Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2003/12/09, Modified: 2018/04/19
Plugin Output

tcp/0


Remote operating system : Linux Kernel 4.4.0-112-generic on Ubuntu 16.04
Confidence level : 100
Method : LinuxDistribution


The remote host is running Linux Kernel 4.4.0-112-generic on Ubuntu 16.04
12053 - Host Fully Qualified Domain Name (FQDN) Resolution
Synopsis
It was possible to resolve the name of the remote host.
Description
Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/02/11, Modified: 2017/04/14
Plugin Output

tcp/0


172.16.0.4 resolves as siakad.poltekom.ac.id.
18261 - Apache Banner Linux Distribution Disclosure
Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution the remote host is running.
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and restart Apache.
n/a
Risk Factor
None
Plugin Information:
Published: 2005/05/15, Modified: 2017/03/13
Plugin Output

tcp/0


The Linux distribution detected was :
- Ubuntu 16.04 (xenial)
- Ubuntu 16.10 (yakkety)
19506 - Nessus Scan Information
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- Whether credentialed or third-party patch management checks are possible.
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2005/08/26, Modified: 2017/10/26
Plugin Output

tcp/0

Information about this scan :

Nessus version : 7.1.0
Plugin feed version : 201806222120
Scanner edition used : Nessus
Scan type : Normal
Scan policy used : Advanced Scan
Scanner IP : 172.16.1.201
Port scanner(s) : netstat
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : yes, as 'puskom' via ssh
Attempt Least Privilege : no
Patch management checks : None
CGI scanning : disabled
Web application tests : disabled
Max hosts : 100
Max checks : 5
Recv timeout : 5
Backports : Detected
Allow post-scan editing: Yes
Scan Start Date : 2018/6/26 8:49 WIB
Scan duration : 521 sec
22869 - Software Enumeration (SSH)
Synopsis
It was possible to enumerate installed software on the remote host via SSH.
Description
Nessus was able to list the software installed on the remote host by calling the appropriate command (e.g., 'rpm -qa' on RPM-based Linux distributions, qpkg, dpkg, etc.).
Solution
Remove any software that is not in compliance with your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information:
Published: 2006/10/15, Modified: 2017/07/28
Plugin Output

tcp/0


Here is the list of packages installed on the remote Debian Linux system :

ii accountsservice 0.6.40-2ubuntu11.3 amd64 query and manipulate user account information
ii acl 2.2.52-3 amd64 Access control list utilities
ii acpid 1:2.0.26-1ubuntu2 amd64 Advanced Configuration and Power Interface event daemon
ii adduser 3.113+nmu3ubuntu4 all add and remove users and groups
ii apache2 2.4.18-2ubuntu3.8 amd64 Apache HTTP Server
ii apache2-bin 2.4.18-2ubuntu3.8 amd64 Apache HTTP Server (modules and other binary files)
ii apache2-data 2.4.18-2ubuntu3.8 all Apache HTTP Server (common files)
ii apache2-utils 2.4.18-2ubuntu3.5 amd64 Apache HTTP Server (utility programs for web servers)
ii apparmor 2.10.95-0ubuntu2.8 amd64 user-space parser utility for AppArmor
ii apport 2.20.1-0ubuntu2.15 all automatically generate crash reports for debugging
ii apport-symptoms 0.20 all symptom scripts for apport
ii apt 1.2.25 amd64 commandline package manager
ii apt-transport-https 1.2.25 amd64 https download transport for APT
ii apt-utils 1.2.25 amd64 package management related utility programs
ii at 3.1.18-2ubuntu1 amd64 Delayed job execution and batch processing
ii attr 1:2.4.47-2 amd64 Utilities for manipulating filesystem extended attributes
ii autoconf 2.69-9 all automatic configure script builder
ii automake 1:1.15-4ubuntu1 all Tool for generating GNU Standards-compliant Makefiles
ii autotools-dev 20150820.1 all Update infrastructure for config.{guess,sub} files
ii base-files 9.4ubuntu4.5 amd64 Debian base system miscellaneous files
ii base-passwd 3.5.39 amd64 Debian base system master password and group files
ii bash 4.3-14ubuntu1.2 amd64 GNU Bourne Again SHell
ii bash-completion 1:2.1-4.2ubuntu1.1 all programmable completion for the bash shell
ii bcache-tools 1.0.8-2 amd64 bcache userspace tools
ii bind9 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Internet Domain Name Server
ii bind9-doc 1:9.10.3.dfsg.P4-8ubuntu1.10 all Documentation for BIND
ii bind9-host 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Version of 'host' bundled with BIND 9.X
ii bind9utils 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Utilities for BIND
ii binutils 2.26.1-1ubuntu1~16.04.6 amd64 GNU assembler, linker and binary utilities
ii bsdmainutils 9.0.6ubuntu3 amd64 collection of more utilities from FreeBSD
ii bsdutils 1:2.27.1-6ubuntu3.4 amd64 basic utilities from 4.4BSD-Lite
ii btrfs-tools 4.4-1ubuntu1 amd64 Checksumming Copy on Write Filesystem utilities
ii build-essential 12.1ubuntu2 amd64 Informational list of build-essential packages
ii busybox-initramfs 1:1.22.0-15ubuntu1 amd64 Standalone shell setup for initramfs
ii busybox-static 1:1.22.0-15ubuntu1 amd64 Standalone rescue shell with tons of builtin utilities
ii byobu 5.106-0ubuntu1 all text window manager, shell multiplexer, integrated DevOps environment
ii bzip2 1.0.6-8 amd64 high-quality block-sorting file compressor - utilities
ii ca-certificates 20170717~16.04.1 all Common CA certificates
ii cifs-utils 2:6.4-1ubuntu1.1 amd64 Common Internet File System utilities
ii cloud-guest-utils 0.27-0ubuntu25 all cloud guest utilities
ii cloud-initramfs-copymods 0.27ubuntu1.5 all copy initramfs modules into root filesystem for later use
ii cloud-initramfs-dyn-netconf 0.27ubuntu1.5 all write a network interface file in /run for BOOTIF
ii command-not-found 0.3ubuntu16.04.2 all Suggest installation of packages in interactive bash sessions
ii command-not-found-data 0.3ubuntu16.04.2 amd64 Set of data files for command-not-found.
ii composer 1.0.0~beta2-1 all dependency manager for PHP
ii console-setup 1.108ubuntu15.3 all console font and keymap setup program
ii console-setup-linux 1.108ubuntu15.3 all Linux specific part of console-setup
ii coreutils 8.25-2ubuntu3~16.04 amd64 GNU core utilities
ii cpio 2.11+dfsg-5ubuntu1 amd64 GNU cpio -- a program to manage archives of files
ii cpp 4:5.3.1-1ubuntu1 amd64 GNU C preprocessor (cpp)
ii cpp-5 5.4.0-6ubuntu1~16.04.6 amd64 GNU C preprocessor
ii crda 3.13-1 amd64 wireless Central Regulatory Domain Agent
ii cron 3.0pl1-128ubuntu2 amd64 process scheduling daemon
ii cryptsetup 2:1.6.6-5ubuntu2.1 amd64 disk encryption support - startup scripts
ii cryptsetup-bin 2:1.6.6-5ubuntu2.1 amd64 disk encryption support - command line tools
ii curl 7.47.0-1ubuntu2.6 amd64 command line tool for transferring data with URL syntax
ii dash 0.5.8-2.1ubuntu2 amd64 POSIX-compliant shell
ii dbus 1.10.6-1ubuntu3.3 amd64 simple interprocess messaging system (daemon and utilities)
ii debconf 1.5.58ubuntu1 all Debian configuration management system
ii debconf-i18n 1.5.58ubuntu1 all full internationalization support for debconf
ii debhelper 9.20160115ubuntu3 all helper programs for debian/rules
ii debianutils 4.7 amd64 Miscellaneous utilities specific to Debian
ii dh-python 2.20151103ubuntu1.1 all Debian helper tools for packaging Python libraries and applications
ii dh-strip-nondeterminism 0.015-1 all debhelper add-on to strip non-determinism from files
ii diffutils 1:3.3-3 amd64 File comparison utilities
ii distro-info-data 0.28ubuntu0.7 all information about the distributions' releases (data files)
ii dmeventd 2:1.02.110-1ubuntu10 amd64 Linux Kernel Device Mapper event daemon
ii dmidecode 3.0-2ubuntu0.1 amd64 SMBIOS/DMI table decoder
ii dmsetup 2:1.02.110-1ubuntu10 amd64 Linux Kernel Device Mapper userspace library
ii dns-root-data 2015052300+h+1 all DNS root data including root zone and DNSSEC key
ii dnscrypt-proxy 1.6.1-1 amd64 Tool for securing communications between a client and a DNS resolver
ii dnsmasq-base 2.75-1ubuntu0.16.04.4 amd64 Small caching DNS proxy and DHCP/TFTP server
ii dnsutils 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Clients provided with BIND
ii dosfstools 3.0.28-2ubuntu0.1 amd64 utilities for making and checking MS-DOS FAT filesystems
ii dpkg 1.18.4ubuntu1.3 amd64 Debian package management system
ii dpkg-dev 1.18.4ubuntu1.3 all Debian package development tools
ii e2fslibs 1.42.13-1ubuntu1 amd64 ext2/ext3/ext4 file system libraries
ii e2fsprogs 1.42.13-1ubuntu1 amd64 ext2/ext3/ext4 file system utilities
ii ed 1.10-2 amd64 classic UNIX line editor
ii eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1 amd64 ejects CDs and operates CD-Changers under Linux
ii ethtool 1:4.5-1 amd64 display or change Ethernet device settings
ii fail2ban 0.9.3-1 all ban hosts that cause multiple authentication errors
ii fakeroot 1.20.2-1ubuntu1 amd64 tool for simulating superuser privileges
ii file 1:5.25-2ubuntu1 amd64 Determines file type using "magic" numbers
ii findutils 4.6.0+git+20160126-2 amd64 utilities for finding files--find, xargs
ii fontconfig-config 2.11.94-0ubuntu1.1 all generic font configuration library - configuration
ii fonts-dejavu-core 2.35-1 all Vera font family derivate with additional characters
ii fonts-ubuntu-font-family-console 1:0.83-0ubuntu2 all Ubuntu Font Family Linux console fonts, sans-serif monospace
ii friendly-recovery 0.2.31 all Make recovery more user-friendly
ii ftp 0.17-33 amd64 classical file transfer client
ii fuse 2.9.4-1ubuntu3.1 amd64 Filesystem in Userspace
ii g++ 4:5.3.1-1ubuntu1 amd64 GNU C++ compiler
ii g++-5 5.4.0-6ubuntu1~16.04.6 amd64 GNU C++ compiler
ii gawk 1:4.1.3+dfsg-0.1 amd64 GNU awk, a pattern scanning and processing language
ii gcc 4:5.3.1-1ubuntu1 amd64 GNU C compiler
ii gcc-5 5.4.0-6ubuntu1~16.04.6 amd64 GNU C compiler
ii gcc-5-base 5.4.0-6ubuntu1~16.04.6 amd64 GCC, the GNU Compiler Collection (base package)
ii gcc-6-base 6.0.1-0ubuntu1 amd64 GCC, the GNU Compiler Collection (base package)
ii geoip-database 20160408-1 all IP lookup command line tools that use the GeoIP library (country database)
ii gettext 0.19.7-2ubuntu3 amd64 GNU Internationalization utilities
ii gettext-base 0.19.7-2ubuntu3 amd64 GNU Internationalization utilities for the base system
ii ghostscript 9.18~dfsg~0-0ubuntu2.8 amd64 interpreter for the PostScript language and for PDF
ii gir1.2-glib-2.0 1.46.0-3ubuntu1 amd64 Introspection data for GLib, GObject, Gio and GModule
ii git 1:2.7.4-0ubuntu1.3 amd64 fast, scalable, distributed revision control system
ii git-man 1:2.7.4-0ubuntu1.3 all fast, scalable, distributed revision control system (manual pages)
ii gnupg 1.4.20-1ubuntu3.1 amd64 GNU privacy guard - a free PGP replacement
ii gpgv 1.4.20-1ubuntu3.1 amd64 GNU privacy guard - signature verification tool
ii grep 2.25-1~16.04.1 amd64 GNU grep, egrep and fgrep
ii groff-base 1.22.3-7 amd64 GNU troff text-formatting system (base system components)
ii grub-common 2.02~beta2-36ubuntu3.16 amd64 GRand Unified Bootloader (common files)
ii grub-gfxpayload-lists 0.7 amd64 GRUB gfxpayload blacklist
ii grub-legacy-ec2 17.1-46-g7acc9e68-0ubuntu1~16.04.1 all Handles update-grub for ec2 instances
ii grub-pc 2.02~beta2-36ubuntu3.16 amd64 GRand Unified Bootloader, version 2 (PC/BIOS version)
ii grub-pc-bin 2.02~beta2-36ubuntu3.16 amd64 GRand Unified Bootloader, version 2 (PC/BIOS binaries)
ii grub2-common 2.02~beta2-36ubuntu3.16 amd64 GRand Unified Bootloader (common files for version 2)
ii gsfonts 1:8.11+urwcyr1.0.7~pre44-4.2ubuntu1 all Fonts for the Ghostscript interpreter(s)
ii gzip 1.6-4ubuntu1 amd64 GNU compression utilities
ii hdparm 9.48+ds-1 amd64 tune hard disk parameters for high performance
ii hostname 3.16ubuntu2 amd64 utility to set/show the host name or domain name
ii ifenslave 2.7ubuntu1 all configure network interfaces for parallel routing (bonding)
ii ifupdown 0.8.10ubuntu1.2 amd64 high level tools to configure network interfaces
ii imagemagick-common 8:6.8.9.9-7ubuntu5.11 all image manipulation programs -- infrastructure
ii info 6.1.0.dfsg.1-5 amd64 Standalone GNU Info documentation browser
ii init 1.29ubuntu4 amd64 System-V-like init utilities - metapackage
ii init-system-helpers 1.29ubuntu4 all helper tools for all init systems
ii initramfs-tools 0.122ubuntu8.10 all generic modular initramfs generator (automation)
ii initramfs-tools-bin 0.122ubuntu8.10 amd64 binaries used by initramfs-tools
ii initramfs-tools-core 0.122ubuntu8.10 all generic modular initramfs generator (core tools)
ii initscripts 2.88dsf-59.3ubuntu2 amd64 scripts for initializing and shutting down the system
ii insserv 1.14.0-5ubuntu3 amd64 boot sequence organizer using LSB init.d script dependency information
ii install-info 6.1.0.dfsg.1-5 amd64 Manage installed documentation in info format
ii installation-report 2.60ubuntu1 all system installation report
ii intltool-debian 0.35.0+20060710.4 all Help i18n of RFC822 compliant config files
ii iproute2 4.3.0-1ubuntu3.16.04.3 amd64 networking and traffic control tools
ii iptables 1.6.0-2ubuntu3 amd64 administration tools for packet filtering and NAT
ii iputils-ping 3:20121221-5ubuntu2 amd64 Tools to test the reachability of network hosts
ii iputils-tracepath 3:20121221-5ubuntu2 amd64 Tools to trace the network path to a remote host
ii irqbalance 1.1.0-2ubuntu1 amd64 Daemon to balance interrupts for SMP systems
ii isc-dhcp-client 4.3.3-5ubuntu12.7 amd64 DHCP client for automatically obtaining an IP address
ii isc-dhcp-common 4.3.3-5ubuntu12.7 amd64 common files used by all of the isc-dhcp packages
ii iso-codes 3.65-1 all ISO language, territory, currency, script codes and their translations
ii iw 3.17-1 amd64 tool for configuring Linux wireless devices
ii javascript-common 11 all Base support for JavaScript library packages
ii jsonlint 1.4.0-1build1 all validating parser of JSON data structures
ii kbd 1.15.5-1ubuntu5 amd64 Linux console font and keytable utilities
ii keyboard-configuration 1.108ubuntu15.3 all system-wide keyboard preferences
ii keyutils 1.5.9-8ubuntu1 amd64 Linux Key Management Utilities
ii klibc-utils 2.0.4-8ubuntu1.16.04.4 amd64 small utilities built with klibc for early boot
ii kmod 22-1ubuntu5 amd64 tools for managing Linux kernel modules
ii krb5-locales 1.13.2+dfsg-5ubuntu2 all Internationalization support for MIT Kerberos
ii language-selector-common 0.165.4 all Language selector for Ubuntu
ii laptop-detect 0.13.7ubuntu2 amd64 attempt to detect a laptop
ii less 481-2.1ubuntu0.2 amd64 pager program similar to more
ii libaccountsservice0 0.6.40-2ubuntu11.3 amd64 query and manipulate user account information - shared libraries
ii libacl1 2.2.52-3 amd64 Access control list shared library
ii libaio1 0.3.110-2 amd64 Linux kernel AIO access library - shared library
ii libalgorithm-diff-perl 1.19.03-1 all module to find differences between files
ii libalgorithm-diff-xs-perl 0.04-4build1 amd64 module to find differences between files (XS accelerated)
ii libalgorithm-merge-perl 0.08-3 all Perl module for three-way merge of textual data
ii libapache2-mod-php7.2 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 server-side, HTML-embedded scripting language (Apache 2 module)
ii libapparmor-perl 2.10.95-0ubuntu2.8 amd64 AppArmor library Perl bindings
ii libapparmor1 2.10.95-0ubuntu2.8 amd64 changehat AppArmor library
ii libapr1 1.5.2-3 amd64 Apache Portable Runtime Library
ii libaprutil1 1.5.4-1build1 amd64 Apache Portable Runtime Utility Library
ii libaprutil1-dbd-sqlite3 1.5.4-1build1 amd64 Apache Portable Runtime Utility Library - SQLite3 Driver
ii libaprutil1-ldap 1.5.4-1build1 amd64 Apache Portable Runtime Utility Library - LDAP Driver
ii libapt-inst2.0 1.2.25 amd64 deb package format runtime library
ii libapt-pkg5.0 1.2.25 amd64 package management runtime library
ii libarchive-zip-perl 1.56-2 all Perl module for manipulation of ZIP archives
ii libarchive13 3.1.2-11ubuntu0.16.04.3 amd64 Multi-format archive and compression library (shared library)
ii libargon2-0 0~20161029-1+ubuntu16.04.1+deb.sury.org+1 amd64 memory-hard hashing function - runtime library
ii libasan2 5.4.0-6ubuntu1~16.04.6 amd64 AddressSanitizer -- a fast memory error detector
ii libasn1-8-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - ASN.1 library
ii libasprintf-dev 0.19.7-2ubuntu3 amd64 GNU Internationalization library development files
ii libasprintf0v5 0.19.7-2ubuntu3 amd64 GNU library to use fprintf and friends in C++
ii libatm1 1:2.5.1-1.5 amd64 shared library for ATM (Asynchronous Transfer Mode)
ii libatomic1 5.4.0-6ubuntu1~16.04.6 amd64 support library providing __atomic built-in functions
ii libattr1 1:2.4.47-2 amd64 Extended attribute shared library
ii libaudit-common 1:2.4.5-1ubuntu2 all Dynamic library for security auditing - common files
ii libaudit1 1:2.4.5-1ubuntu2 amd64 Dynamic library for security auditing
ii libavahi-client3 0.6.32~rc+dfsg-1ubuntu2 amd64 Avahi client library
ii libavahi-common-data 0.6.32~rc+dfsg-1ubuntu2 amd64 Avahi common data files
ii libavahi-common3 0.6.32~rc+dfsg-1ubuntu2 amd64 Avahi common library
ii libbind9-140 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 BIND9 Shared Library used by BIND
ii libblkid1 2.27.1-6ubuntu3.4 amd64 block device ID library
ii libbsd0 0.8.2-1 amd64 utility functions from BSD systems - shared library
ii libbz2-1.0 1.0.6-8 amd64 high-quality block-sorting file compressor library - runtime
ii libc-bin 2.23-0ubuntu10 amd64 GNU C Library: Binaries
ii libc-client2007e 8:2007f~dfsg-4 amd64 c-client library for mail protocols - library files
ii libc-dev-bin 2.23-0ubuntu10 amd64 GNU C Library: Development binaries
ii libc6 2.23-0ubuntu10 amd64 GNU C Library: Shared libraries
ii libc6-dev 2.23-0ubuntu10 amd64 GNU C Library: Development Libraries and Header Files
ii libcap-ng0 0.7.7-1 amd64 An alternate POSIX capabilities library
ii libcap2 1:2.24-12 amd64 POSIX 1003.1e capabilities (library)
ii libcap2-bin 1:2.24-12 amd64 POSIX 1003.1e capabilities (utilities)
ii libcc1-0 5.4.0-6ubuntu1~16.04.6 amd64 GCC cc1 plugin for GDB
ii libcgi-fast-perl 1:2.10-1 all CGI subclass for work with FCGI
ii libcgi-pm-perl 4.26-1 all module for Common Gateway Interface applications
ii libcilkrts5 5.4.0-6ubuntu1~16.04.6 amd64 Intel Cilk Plus language extensions (runtime)
ii libcomerr2 1.42.13-1ubuntu1 amd64 common error description library
ii libcroco3 0.6.11-1 amd64 Cascading Style Sheet (CSS) parsing and manipulation toolkit
ii libcryptsetup4 2:1.6.6-5ubuntu2.1 amd64 disk encryption support - shared library
ii libcups2 2.1.3-4ubuntu0.4 amd64 Common UNIX Printing System(tm) - Core library
ii libcupsfilters1 1.8.3-2ubuntu3.4 amd64 OpenPrinting CUPS Filters - Shared library
ii libcupsimage2 2.1.3-4ubuntu0.4 amd64 Common UNIX Printing System(tm) - Raster image library
ii libcurl3 7.47.0-1ubuntu2.8 amd64 easy-to-use client-side URL transfer library (OpenSSL flavour)
ii libcurl3-gnutls 7.47.0-1ubuntu2.6 amd64 easy-to-use client-side URL transfer library (GnuTLS flavour)
ii libdb5.3 5.3.28-11ubuntu0.1 amd64 Berkeley v5.3 Database Libraries [runtime]
ii libdbd-mysql-perl 4.033-1ubuntu0.1 amd64 Perl5 database interface to the MySQL database
ii libdbi-perl 1.634-1build1 amd64 Perl Database Interface (DBI)
ii libdbus-1-3 1.10.6-1ubuntu3.3 amd64 simple interprocess messaging system (library)
ii libdbus-glib-1-2 0.106-1 amd64 simple interprocess messaging system (GLib-based shared library)
ii libdebconfclient0 0.198ubuntu1 amd64 Debian Configuration Management System (C-implementation library)
ii libdevmapper-event1.02.1 2:1.02.110-1ubuntu10 amd64 Linux Kernel Device Mapper event support library
ii libdevmapper1.02.1 2:1.02.110-1ubuntu10 amd64 Linux Kernel Device Mapper userspace library
ii libdns-export162 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Exported DNS Shared Library
ii libdns162 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 DNS Shared Library used by BIND
ii libdpkg-perl 1.18.4ubuntu1.3 all Dpkg perl modules
ii libdrm-common 2.4.83-1~16.04.1 all Userspace interface to kernel DRM services -- common files
ii libdrm2 2.4.83-1~16.04.1 amd64 Userspace interface to kernel DRM services -- runtime
ii libdumbnet1 1.12-7 amd64 dumb, portable networking library -- shared library
ii libedit2 3.1-20150325-1ubuntu2 amd64 BSD editline and history libraries
ii libelf1 0.165-3ubuntu1 amd64 library to read and write ELF files
ii libencode-locale-perl 1.05-1 all utility to determine the locale encoding
ii liberror-perl 0.17-1.2 all Perl module for error/exception handling in an OO-ish way
ii libestr0 0.1.10-1 amd64 Helper functions for handling strings (lib)
ii libevent-2.0-5 2.0.21-stable-2ubuntu0.16.04.1 amd64 Asynchronous event notification library
ii libevent-core-2.0-5 2.0.21-stable-2ubuntu0.16.04.1 amd64 Asynchronous event notification library (core)
ii libexpat1 2.1.0-7ubuntu0.16.04.3 amd64 XML parsing C library - runtime library
ii libexporter-tiny-perl 0.042-1 all tiny exporter similar to Sub::Exporter
ii libfakeroot 1.20.2-1ubuntu1 amd64 tool for simulating superuser privileges - shared libraries
ii libfcgi-perl 0.77-1build1 amd64 helper module for FastCGI
ii libfdisk1 2.27.1-6ubuntu3.4 amd64 fdisk partitioning library
ii libffi6 3.2.1-4 amd64 Foreign Function Interface library runtime
ii libfftw3-double3 3.3.4-2ubuntu1 amd64 Library for computing Fast Fourier Transforms - Double precision
ii libfile-copy-recursive-perl 0.38-1 all Perl extension for recursively copying files and directories
ii libfile-fcntllock-perl 0.22-3 amd64 Perl module for file locking with fcntl(2)
ii libfile-stripnondeterminism-perl 0.015-1 all Perl module for stripping non-determinism from files
ii libfontconfig1 2.11.94-0ubuntu1.1 amd64 generic font configuration library - runtime
ii libfreetype6 2.6.1-0.1ubuntu2.3 amd64 FreeType 2 font engine, shared library files
ii libfribidi0 0.19.7-1 amd64 Free Implementation of the Unicode BiDi algorithm
ii libfuse2 2.9.4-1ubuntu3.1 amd64 Filesystem in Userspace (library)
ii libgcc-5-dev 5.4.0-6ubuntu1~16.04.6 amd64 GCC support library (development files)
ii libgcc1 1:6.0.1-0ubuntu1 amd64 GCC support library
ii libgcrypt20 1.6.5-2ubuntu0.3 amd64 LGPL Crypto library - runtime library
ii libgd3 2.2.5-4+ubuntu16.04.1+deb.sury.org+2 amd64 GD Graphics Library
ii libgdbm3 1.8.3-13.1 amd64 GNU dbm database routines (runtime version)
ii libgeoip1 1.6.9-1 amd64 non-DNS IP-to-country resolver library
ii libgettextpo-dev 0.19.7-2ubuntu3 amd64 GNU Internationalization library development files
ii libgettextpo0 0.19.7-2ubuntu3 amd64 GNU Internationalization library
ii libgirepository-1.0-1 1.46.0-3ubuntu1 amd64 Library for handling GObject introspection data (runtime library)
ii libglib2.0-0 2.48.2-0ubuntu1 amd64 GLib library of C routines
ii libglib2.0-data 2.48.2-0ubuntu1 all Common files for GLib library
ii libgmp10 2:6.1.0+dfsg-2 amd64 Multiprecision arithmetic library
ii libgnutls-openssl27 3.4.10-4ubuntu1.4 amd64 GNU TLS library - OpenSSL wrapper
ii libgnutls30 3.4.10-4ubuntu1.4 amd64 GNU TLS library - main runtime library
ii libgomp1 5.4.0-6ubuntu1~16.04.6 amd64 GCC OpenMP (GOMP) support library
ii libgpg-error0 1.21-2ubuntu1 amd64 library for common error values and messages in GnuPG components
ii libgpm2 1.20.4-6.1 amd64 General Purpose Mouse - shared library
ii libgs9 9.18~dfsg~0-0ubuntu2.8 amd64 interpreter for the PostScript language and for PDF - Library
ii libgs9-common 9.18~dfsg~0-0ubuntu2.8 all interpreter for the PostScript language and for PDF - common files
ii libgssapi-krb5-2 1.13.2+dfsg-5ubuntu2 amd64 MIT Kerberos runtime libraries - krb5 GSS-API Mechanism
ii libgssapi3-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - GSSAPI support library
ii libhcrypto4-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - crypto library
ii libheimbase1-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - Base library
ii libheimntlm0-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - NTLM support library
ii libhogweed4 3.2-1ubuntu0.16.04.1 amd64 low level cryptographic library (public-key cryptos)
ii libhtml-parser-perl 3.72-1 amd64 collection of modules that parse HTML text documents
ii libhtml-tagset-perl 3.20-2 all Data tables pertaining to HTML
ii libhtml-template-perl 2.95-2 all module for using HTML templates with Perl
ii libhttp-date-perl 6.02-1 all module of date conversion routines
ii libhttp-message-perl 6.11-1 all perl interface to HTTP style messages
ii libhx509-5-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - X509 support library
ii libicu55 55.1-7ubuntu0.3 amd64 International Components for Unicode
ii libidn11 1.32-3ubuntu1.2 amd64 GNU Libidn library, implementation of IETF IDN specifications
ii libijs-0.35 0.35-12 amd64 IJS raster image transport protocol: shared library
ii libio-html-perl 1.001-1 all open an HTML file with automatic charset detection
ii libirs141 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 DNS Shared Library used by BIND
ii libisc-export160 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Exported ISC Shared Library
ii libisc160 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 ISC Shared Library used by BIND
ii libisccc140 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Command Channel Library used by BIND
ii libisccfg140 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Config File Handling Library used by BIND
ii libisl15 0.16.1-1 amd64 manipulating sets and relations of integer points bounded by linear constraints
ii libitm1 5.4.0-6ubuntu1~16.04.6 amd64 GNU Transactional Memory Library
ii libjbig0 2.1-3.1+deb.sury.org~xenial+1 amd64 JBIGkit libraries
ii libjbig2dec0 0.12+20150918-1ubuntu0.1 amd64 JBIG2 decoder library - shared libraries
ii libjpeg-turbo8 1.4.2-0ubuntu3 amd64 IJG JPEG compliant runtime library.
ii libjpeg8 8c-2ubuntu8 amd64 Independent JPEG Group's JPEG runtime library (dependency package)
ii libjs-excanvas 0.r3-4 all HTML5 Canvas for Internet Explorer
ii libjson-c2 0.11-4ubuntu2 amd64 JSON manipulation library - shared library
ii libk5crypto3 1.13.2+dfsg-5ubuntu2 amd64 MIT Kerberos runtime libraries - Crypto Library
ii libkeyutils1 1.5.9-8ubuntu1 amd64 Linux Key Management Utilities (library)
ii libklibc 2.0.4-8ubuntu1.16.04.4 amd64 minimal libc subset for use with initramfs
ii libkmod2 22-1ubuntu5 amd64 libkmod shared library
ii libkrb5-26-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - libraries
ii libkrb5-3 1.13.2+dfsg-5ubuntu2 amd64 MIT Kerberos runtime libraries
ii libkrb5support0 1.13.2+dfsg-5ubuntu2 amd64 MIT Kerberos runtime libraries - Support library
ii liblcms2-2 2.6-3ubuntu2 amd64 Little CMS 2 color management library
ii libldap-2.4-2 2.4.42+dfsg-2ubuntu3.2 amd64 OpenLDAP libraries
ii libldb1 2:1.1.24-1ubuntu3 amd64 LDAP-like embedded database - shared library
ii liblist-moreutils-perl 0.413-1build1 amd64 Perl module with additional list functions not found in List::Util
ii liblocale-gettext-perl 1.07-1build1 amd64 module using libc functions for internationalization in Perl
ii liblqr-1-0 0.4.2-2 amd64 converts plain array images into multi-size representation
ii liblsan0 5.4.0-6ubuntu1~16.04.6 amd64 LeakSanitizer -- a memory leak detector (runtime)
ii libltdl-dev 2.4.6-0.1 amd64 System independent dlopen wrapper for GNU libtool
ii libltdl7 2.4.6-0.1 amd64 System independent dlopen wrapper for GNU libtool
ii liblua5.1-0 5.1.5-8ubuntu1 amd64 Shared library for the Lua interpreter version 5.1
ii liblvm2app2.2 2.02.133-1ubuntu10 amd64 LVM2 application library
ii liblvm2cmd2.02 2.02.133-1ubuntu10 amd64 LVM2 command library
ii liblwp-mediatypes-perl 6.02-1 all module to guess media type for a file or a URL
ii liblwres141 1:9.10.3.dfsg.P4-8ubuntu1.10 amd64 Lightweight Resolver Library used by BIND
ii liblxc1 2.0.8-0ubuntu1~16.04.2 amd64 Linux Containers userspace tools (library)
ii liblz4-1 0.0~r131-2ubuntu2 amd64 Fast LZ compression algorithm library - runtime
ii liblzma5 5.1.1alpha+20120614-2ubuntu2 amd64 XZ-format compression library
ii liblzo2-2 2.08-1.2 amd64 data compression library
ii libmagic1 1:5.25-2ubuntu1 amd64 File type determination library using "magic" numbers
ii libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.11 amd64 low-level image manipulation library -- quantum depth Q16
ii libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.11 amd64 image manipulation library
ii libmail-sendmail-perl 0.79.16-1 all Send email from a perl script
ii libmcrypt4 2.5.8-3.3 amd64 De-/Encryption Library
ii libmnl0 1.0.3-5 amd64 minimalistic Netlink communication library
ii libmount1 2.27.1-6ubuntu3.4 amd64 device mounting library
ii libmpc3 1.0.3-1 amd64 multiple precision complex floating-point library
ii libmpdec2 2.4.2-1 amd64 library for decimal floating point arithmetic (runtime library)
ii libmpfr4 3.1.4-1 amd64 multiple precision floating-point computation
ii libmpx0 5.4.0-6ubuntu1~16.04.6 amd64 Intel memory protection extensions (runtime)
ii libmspack0 0.5-1ubuntu0.16.04.1 amd64 library for Microsoft compression formats (shared library)
ii libmysqlclient20 5.7.22-0ubuntu0.16.04.1 amd64 MySQL database client library
ii libncurses5 6.0+20160213-1ubuntu1 amd64 shared libraries for terminal handling
ii libncursesw5 6.0+20160213-1ubuntu1 amd64 shared libraries for terminal handling (wide character support)
ii libnetfilter-conntrack3 1.0.5-1 amd64 Netfilter netlink-conntrack library
ii libnettle6 3.2-1ubuntu0.16.04.1 amd64 low level cryptographic library (symmetric and one-way cryptos)
ii libnewt0.52 0.52.18-1ubuntu2 amd64 Not Erik's Windowing Toolkit - text mode windowing with slang
ii libnfnetlink0 1.0.1-3 amd64 Netfilter netlink library
ii libnih1 1.0.3-4.3ubuntu1 amd64 NIH Utility Library
ii libnl-3-200 3.2.27-1ubuntu0.16.04.1 amd64 library for dealing with netlink sockets
ii libnl-genl-3-200 3.2.27-1ubuntu0.16.04.1 amd64 library for dealing with netlink sockets - generic netlink
ii libnuma1 2.0.11-1ubuntu1 amd64 Libraries for controlling NUMA policy
ii libp11-kit0 0.23.2-5~ubuntu16.04.1 amd64 library for loading and coordinating access to PKCS#11 modules - runtime
ii libpam-modules 1.1.8-3.2ubuntu2 amd64 Pluggable Authentication Modules for PAM
ii libpam-modules-bin 1.1.8-3.2ubuntu2 amd64 Pluggable Authentication Modules for PAM - helper binaries
ii libpam-runtime 1.1.8-3.2ubuntu2 all Runtime support for the PAM library
ii libpam-systemd 229-4ubuntu21.1 amd64 system and service manager - PAM module
ii libpam0g 1.1.8-3.2ubuntu2 amd64 Pluggable Authentication Modules library
ii libpaper-utils 1.1.24+nmu4ubuntu1 amd64 library for handling paper characteristics (utilities)
ii libpaper1 1.1.24+nmu4ubuntu1 amd64 library for handling paper characteristics
ii libparted2 3.2-15ubuntu0.1 amd64 disk partition manipulator - shared library
ii libpcap0.8 1.7.4-2 amd64 system interface for user-level packet capture
ii libpci3 1:3.3.1-1.1ubuntu1.1 amd64 Linux PCI Utilities (shared library)
ii libpcre16-3 2:8.41-4+ubuntu16.04.1+deb.sury.org+1 amd64 Perl 5 Compatible Regular Expression Library - 16 bit runtime files
ii libpcre3 2:8.41-4+ubuntu16.04.1+deb.sury.org+1 amd64 Perl 5 Compatible Regular Expression Library - runtime files
ii libpcre3-dev 2:8.41-4+ubuntu16.04.1+deb.sury.org+1 amd64 Perl 5 Compatible Regular Expression Library - development files
ii libpcre32-3 2:8.41-4+ubuntu16.04.1+deb.sury.org+1 amd64 Perl 5 Compatible Regular Expression Library - 32 bit runtime files
ii libpcrecpp0v5 2:8.41-4+ubuntu16.04.1+deb.sury.org+1 amd64 Perl 5 Compatible Regular Expression Library - C++ runtime files
ii libperl5.22 5.22.1-9ubuntu0.2 amd64 shared Perl library
ii libpipeline1 1.4.1-2 amd64 pipeline manipulation library
ii libplymouth4 0.9.2-3ubuntu13.2 amd64 graphical boot animation and logger - shared libraries
ii libpng12-0 1.2.54-1ubuntu1 amd64 PNG library - runtime
ii libpolkit-agent-1-0 0.105-14.1 amd64 PolicyKit Authentication Agent API
ii libpolkit-backend-1-0 0.105-14.1 amd64 PolicyKit backend API
ii libpolkit-gobject-1-0 0.105-14.1 amd64 PolicyKit Authorization API
ii libpopt0 1.16-10 amd64 lib for parsing cmdline parameters
ii libpq5 9.5.13-0ubuntu0.16.04 amd64 PostgreSQL C client library
ii libprocps4 2:3.3.10-4ubuntu2.3 amd64 library for accessing process information from /proc
ii libpython-stdlib 2.7.11-1 amd64 interactive high-level object-oriented language (default python version)
ii libpython2.7 2.7.12-1ubuntu0~16.04.3 amd64 Shared Python runtime library (version 2.7)
ii libpython2.7-minimal 2.7.12-1ubuntu0~16.04.3 amd64 Minimal subset of the Python language (version 2.7)
ii libpython2.7-stdlib 2.7.12-1ubuntu0~16.04.3 amd64 Interactive high-level object-oriented language (standard library, version 2.7)
ii libpython3-stdlib 3.5.1-3 amd64 interactive high-level object-oriented language (default python3 version)
ii libpython3.5 3.5.2-2ubuntu0~16.04.4 amd64 Shared Python runtime library (version 3.5)
ii libpython3.5-minimal 3.5.2-2ubuntu0~16.04.4 amd64 Minimal subset of the Python language (version 3.5)
ii libpython3.5-stdlib 3.5.2-2ubuntu0~16.04.4 amd64 Interactive high-level object-oriented language (standard library, version 3.5)
ii libquadmath0 5.4.0-6ubuntu1~16.04.6 amd64 GCC Quad-Precision Math Library
ii libreadline5 5.2+dfsg-3build1 amd64 GNU readline and history libraries, run-time libraries
ii libreadline6 6.3-8ubuntu2 amd64 GNU readline and history libraries, run-time libraries
ii libroken18-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - roken support library
ii librtmp1 2.4+20151223.gitfa8646d-1ubuntu0.1 amd64 toolkit for RTMP streams (shared library)
ii libsasl2-2 2.1.26.dfsg1-14build1 amd64 Cyrus SASL - authentication abstraction library
ii libsasl2-modules 2.1.26.dfsg1-14build1 amd64 Cyrus SASL - pluggable authentication modules
ii libsasl2-modules-db 2.1.26.dfsg1-14build1 amd64 Cyrus SASL - pluggable authentication modules (DB)
ii libseccomp2 2.3.1-2.1ubuntu2~16.04.1 amd64 high level interface to Linux seccomp filter
ii libselinux1 2.4-3build2 amd64 SELinux runtime shared libraries
ii libsemanage-common 2.3-1build3 all Common files for SELinux policy management libraries
ii libsemanage1 2.3-1build3 amd64 SELinux policy management library
ii libsepol1 2.4-2 amd64 SELinux library for manipulating binary security policies
ii libsigsegv2 2.10-4 amd64 Library for handling page faults in a portable way
ii libslang2 2.3.0-2ubuntu1 amd64 S-Lang programming library - runtime version
ii libsmartcols1 2.27.1-6ubuntu3.4 amd64 smart column output alignment library
ii libsmbclient 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 shared library for communication with SMB/CIFS servers
ii libsodium18 1.0.8-5 amd64 Network communication, cryptography and signaturing library
ii libsodium23 1.0.16-2+ubuntu16.04.1+deb.sury.org+3 amd64 Network communication, cryptography and signaturing library
ii libsqlite3-0 3.11.0-1ubuntu1 amd64 SQLite 3 shared library
ii libss2 1.42.13-1ubuntu1 amd64 command-line interface parsing library
ii libssh2-1 1.5.0-2ubuntu0.1 amd64 SSH2 client-side library
ii libssl-dev 1.0.2g-1ubuntu4.10 amd64 Secure Sockets Layer toolkit - development files
ii libssl-doc 1.0.2g-1ubuntu4.10 all Secure Sockets Layer toolkit - development documentation
ii libssl1.0.0 1.0.2g-1ubuntu4.10 amd64 Secure Sockets Layer toolkit - shared libraries
ii libssl1.1 1.1.0g-2.1+ubuntu16.04.1+deb.sury.org+1 amd64 Secure Sockets Layer toolkit - shared libraries
ii libstdc++-5-dev 5.4.0-6ubuntu1~16.04.6 amd64 GNU Standard C++ Library v3 (development files)
ii libstdc++6 5.4.0-6ubuntu1~16.04.6 amd64 GNU Standard C++ Library v3
ii libsys-hostname-long-perl 1.5-1 all Figure out the long (fully-qualified) hostname
ii libsystemd0 229-4ubuntu21.1 amd64 systemd utility library
ii libtalloc2 2.1.5-2 amd64 hierarchical pool based memory allocator
ii libtasn1-6 4.7-3ubuntu0.16.04.3 amd64 Manage ASN.1 structures (runtime)
ii libtdb1 1.3.8-2 amd64 Trivial Database - shared library
ii libterm-readkey-perl 2.33-1build1 amd64 perl module for simple terminal control
ii libtevent0 0.9.28-0ubuntu0.16.04.1 amd64 talloc-based event loop library - shared library
ii libtext-charwidth-perl 0.04-7build5 amd64 get display widths of characters on the terminal
ii libtext-iconv-perl 1.7-5build4 amd64 converts between character sets in Perl
ii libtext-wrapi18n-perl 0.06-7.1 all internationalized substitute of Text::Wrap
ii libtiff5 4.0.6-1ubuntu0.2 amd64 Tag Image File Format (TIFF) library
ii libtimedate-perl 2.3000-2 all collection of modules to manipulate date/time information
ii libtinfo5 6.0+20160213-1ubuntu1 amd64 shared low-level terminfo library for terminal handling
ii libtool 2.4.6-0.1 all Generic library support script
ii libtsan0 5.4.0-6ubuntu1~16.04.6 amd64 ThreadSanitizer -- a Valgrind-based detector of data races (runtime)
ii libubsan0 5.4.0-6ubuntu1~16.04.6 amd64 UBSan -- undefined behaviour sanitizer (runtime)
ii libudev1 229-4ubuntu21.1 amd64 libudev shared library
ii libunistring0 0.9.3-5.2ubuntu1 amd64 Unicode string library for C
ii liburi-perl 1.71-1 all module to manipulate and access URI strings
ii libusb-0.1-4 2:0.1.12-28 amd64 userspace USB programming library
ii libusb-1.0-0 2:1.0.20-1 amd64 userspace USB programming library
ii libustr-1.0-1 1.0.4-5 amd64 Micro string library: shared library
ii libutempter0 1.1.6-3 amd64 privileged helper for utmp/wtmp updates (runtime)
ii libuuid1 2.27.1-6ubuntu3.4 amd64 Universally Unique ID library
ii libwbclient0 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 Samba winbind client library
ii libwebp6 0.6.0-4+ubuntu16.04.1+deb.sury.org+1 amd64 Lossy compression of digital photographic images.
ii libwind0-heimdal 1.7~git20150920+dfsg-4ubuntu1.16.04.1 amd64 Heimdal Kerberos - stringprep implementation
ii libwrap0 7.6.q-25 amd64 Wietse Venema's TCP wrappers library
ii libx11-6 2:1.6.3-1ubuntu2 amd64 X11 client-side library
ii libx11-data 2:1.6.3-1ubuntu2 all X11 client-side library
ii libxau6 1:1.0.8-1 amd64 X11 authorisation library
ii libxcb1 1.11.1-1ubuntu1 amd64 X C Binding
ii libxdmcp6 1:1.1.2-1.1 amd64 X11 Display Manager Control Protocol library
ii libxext6 2:1.3.3-1 amd64 X11 miscellaneous extension library
ii libxml2 2.9.3+dfsg1-1ubuntu0.5 amd64 GNOME XML library
ii libxmuu1 2:1.1.2-2 amd64 X11 miscellaneous micro-utility library
ii libxpm4 1:3.5.11-1ubuntu0.16.04.1 amd64 X11 pixmap library
ii libxslt1.1 1.1.28-2.1ubuntu0.1 amd64 XSLT 1.0 processing library - runtime library
ii libxtables11 1.6.0-2ubuntu3 amd64 netfilter xtables library
ii libzip4 1.0.1-0ubuntu1 amd64 library for reading, creating, and modifying zip archives (runtime)
ii libzip5 1.3.2-1+ubuntu16.04.1+deb.sury.org+1 amd64 library for reading, creating, and modifying zip archives (runtime)
ii linux-base 4.0ubuntu1 all Linux image base package
ii linux-firmware 1.157.16 all Firmware for Linux kernel drivers
ii linux-generic 4.4.0.112.118 amd64 Complete Generic Linux kernel and headers
ii linux-headers-4.4.0-112 4.4.0-112.135 all Header files related to Linux kernel version 4.4.0
ii linux-headers-4.4.0-112-generic 4.4.0-112.135 amd64 Linux kernel headers for version 4.4.0 on 64 bit x86 SMP
ii linux-headers-4.4.0-87 4.4.0-87.110 all Header files related to Linux kernel version 4.4.0
ii linux-headers-4.4.0-87-generic 4.4.0-87.110 amd64 Linux kernel headers for version 4.4.0 on 64 bit x86 SMP
ii linux-headers-generic 4.4.0.112.118 amd64 Generic Linux kernel headers
ii linux-image-4.4.0-112-generic 4.4.0-112.135 amd64 Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii linux-image-4.4.0-87-generic 4.4.0-87.110 amd64 Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii linux-image-extra-4.4.0-112-generic 4.4.0-112.135 amd64 Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP
ii linux-image-extra-4.4.0-87-generic 4.4.0-87.110 amd64 Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP
ii linux-image-generic 4.4.0.112.118 amd64 Generic Linux kernel image
ii linux-libc-dev 4.4.0-112.135 amd64 Linux Kernel Headers for development
ii locales 2.23-0ubuntu10 all GNU C Library: National Language (locale) data [support]
ii login 1:4.2-3.1ubuntu5.3 amd64 system login tools
ii logrotate 3.8.7-2ubuntu2.16.04.2 amd64 Log rotation utility
ii lsb-base 9.20160110ubuntu0.2 all Linux Standard Base init script functionality
ii lsb-release 9.20160110ubuntu0.2 all Linux Standard Base version reporting utility
ii lshw 02.17-1.1ubuntu3.4 amd64 information about hardware configuration
ii lsof 4.89+dfsg-0.1 amd64 Utility to list open files
ii ltrace 0.7.3-5.1ubuntu4 amd64 Tracks runtime library calls in dynamically linked programs
ii lvm2 2.02.133-1ubuntu10 amd64 Linux Logical Volume Manager
ii lxc-common 2.0.8-0ubuntu1~16.04.2 amd64 Linux Containers userspace tools (common tools)
ii lxcfs 2.0.8-0ubuntu1~16.04.2 amd64 FUSE based filesystem for LXC
ii lxd 2.0.11-0ubuntu1~16.04.4 amd64 Container hypervisor based on LXC - daemon
ii lxd-client 2.0.11-0ubuntu1~16.04.4 amd64 Container hypervisor based on LXC - client
ii m4 1.4.17-5 amd64 macro processing language
ii make 4.1-6 amd64 utility for directing compilation
ii makedev 2.3.1-93ubuntu2~ubuntu16.04.1 all creates device files in /dev
ii man-db 2.7.5-1 amd64 on-line manual pager
ii manpages 4.04-2 all Manual pages about using a GNU/Linux system
ii manpages-dev 4.04-2 all Manual pages about using GNU/Linux for development
ii mariadb-client-10.0 10.0.34-0ubuntu0.16.04.1 amd64 MariaDB database client binaries
ii mariadb-client-core-10.0 10.0.34-0ubuntu0.16.04.1 amd64 MariaDB database core client binaries
ii mariadb-common 10.0.34-0ubuntu0.16.04.1 all MariaDB common metapackage
ii mariadb-server 10.0.34-0ubuntu0.16.04.1 all MariaDB database server (metapackage depending on the latest version)
ii mariadb-server-10.0 10.0.34-0ubuntu0.16.04.1 amd64 MariaDB database server binaries
ii mariadb-server-core-10.0 10.0.34-0ubuntu0.16.04.1 amd64 MariaDB database core server files
ii mawk 1.3.3-17ubuntu2 amd64 a pattern scanning and text processing language
ii mdadm 3.3-2ubuntu7.6 amd64 tool to administer Linux MD arrays (software RAID)
ii mercurial 3.7.3-1ubuntu1 amd64 easy-to-use, scalable distributed version control system
ii mercurial-common 3.7.3-1ubuntu1 all easy-to-use, scalable distributed version control system (common files)
ii mime-support 3.59ubuntu1 all MIME files 'mime.types' & 'mailcap', and support programs
ii mlocate 0.26-1ubuntu2 amd64 quickly find files on the filesystem based on their name
ii mlock 8:2007f~dfsg-4 amd64 mailbox locking program
ii mount 2.27.1-6ubuntu3.4 amd64 tools for mounting and manipulating filesystems
ii mtr-tiny 0.86-1ubuntu0.1 amd64 Full screen ncurses traceroute tool
ii multiarch-support 2.23-0ubuntu10 amd64 Transitional package to ensure multiarch compatibility
ii mysql-common 5.7.21-0ubuntu0.16.04.1 all MySQL database common files, e.g. /etc/mysql/my.cnf
ii nano 2.5.3-2ubuntu2 amd64 small, friendly text editor inspired by Pico
ii ncurses-base 6.0+20160213-1ubuntu1 all basic terminal type definitions
ii ncurses-bin 6.0+20160213-1ubuntu1 amd64 terminal-related programs and man pages
ii ncurses-term 6.0+20160213-1ubuntu1 all additional terminal type definitions
ii net-tools 1.60-26ubuntu1 amd64 NET-3 networking toolkit
ii netbase 5.3 all Basic TCP/IP networking system
ii netcat-openbsd 1.105-7ubuntu1 amd64 TCP/IP swiss army knife
ii ntfs-3g 1:2015.3.14AR.1-1ubuntu0.1 amd64 read/write NTFS driver for FUSE
ii open-iscsi 2.0.873+git0.3b4b4500-14ubuntu3.4 amd64 iSCSI initiator tools
ii open-vm-tools 2:10.0.7-3227872-5ubuntu1~16.04.1 amd64 Open VMware Tools for virtual machines hosted on VMware (CLI)
ii openssh-client 1:7.2p2-4ubuntu2.4 amd64 secure shell (SSH) client, for secure access to remote machines
ii openssh-server 1:7.2p2-4ubuntu2.4 amd64 secure shell (SSH) server, for secure access from remote machines
ii openssh-sftp-server 1:7.2p2-4ubuntu2.4 amd64 secure shell (SSH) sftp server module, for SFTP access from remote machines
ii openssl 1.1.0h-2.0+ubuntu16.04.1+deb.sury.org+1 amd64 Secure Sockets Layer toolkit - cryptographic utility
ii os-prober 1.70ubuntu3.3 amd64 utility to detect other OSes on a set of drives
ii overlayroot 0.27ubuntu1.5 all use an overlayfs on top of a read-only root filesystem
ii owncloud-files 10.0.8-1+1.1 all ownCloud - Server
ii parted 3.2-15ubuntu0.1 amd64 disk partition manipulator
ii passwd 1:4.2-3.1ubuntu5.3 amd64 change and administer password and group data
ii pastebinit 1.5-1 all command-line pastebin client
ii patch 2.7.5-1 amd64 Apply a diff file to an original
ii pciutils 1:3.3.1-1.1ubuntu1.1 amd64 Linux PCI Utilities
ii perl 5.22.1-9ubuntu0.2 amd64 Larry Wall's Practical Extraction and Report Language
ii perl-base 5.22.1-9ubuntu0.2 amd64 minimal Perl system
ii perl-modules-5.22 5.22.1-9ubuntu0.2 all Core Perl modules
ii php 1:7.2+60+ubuntu16.04.1+deb.sury.org+1 all server-side, HTML-embedded scripting language (default)
ii php-cli-prompt 1.0.1+dfsg-1build1 all tiny helper prompting for user input
ii php-common 1:60+ubuntu16.04.1+deb.sury.org+1 all Common files for PHP packages
ii php-composer-semver 1.2.0-1build1 all Semver library that offers utilities, version constraint parsing and
ii php-composer-spdx-licenses 1.1.2-1build1 all SPDX licenses list and validation library
ii php-imagick 3.4.3-3+ubuntu16.04.1+deb.sury.org+1 amd64 Provides a wrapper to the ImageMagick library
ii php-json-schema 1.6.1-1build1 all implementation of JSON schema
ii php-symfony-console 2.7.10-0ubuntu2 all run tasks from the command line
ii php-symfony-filesystem 2.7.10-0ubuntu2 all basic filesystem utilities
ii php-symfony-finder 2.7.10-0ubuntu2 all find files and directories
ii php-symfony-process 2.7.10-0ubuntu2 all execute commands in sub-processes
ii php7.2 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 all server-side, HTML-embedded scripting language (metapackage)
ii php7.2-cli 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 command-line interpreter for the PHP scripting language
ii php7.2-common 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 documentation, examples and common module for PHP
ii php7.2-gd 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 GD module for PHP
ii php7.2-json 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 JSON module for PHP
ii php7.2-mbstring 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 MBSTRING module for PHP
ii php7.2-mysql 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 MySQL module for PHP
ii php7.2-opcache 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 Zend OpCache module for PHP
ii php7.2-readline 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 readline module for PHP
ii php7.2-xml 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 DOM, SimpleXML, WDDX, XML, and XSL module for PHP
ii php7.2-zip 7.2.2-3+ubuntu16.04.1+deb.sury.org+1 amd64 Zip module for PHP
ii plymouth 0.9.2-3ubuntu13.2 amd64 boot animation, logger and I/O multiplexer
ii plymouth-theme-ubuntu-text 0.9.2-3ubuntu13.2 amd64 boot animation, logger and I/O multiplexer - ubuntu text theme
ii po-debconf 1.0.19 all tool for managing templates file translations with gettext
ii policykit-1 0.105-14.1 amd64 framework for managing administrative policies and privileges
ii poppler-data 0.4.7-7 all encoding data for the poppler PDF rendering library
ii popularity-contest 1.64ubuntu2 all Vote for your favourite packages automatically
ii powermgmt-base 1.31+nmu1 all Common utils and configs for power management
ii procps 2:3.3.10-4ubuntu2.3 amd64 /proc file system utilities
ii psmisc 22.21-2.1build1 amd64 utilities that use the proc file system
ii python 2.7.11-1 amd64 interactive high-level object-oriented language (default version)
ii python-apt 1.1.0~beta1build1 amd64 Python interface to libapt-pkg
ii python-apt-common 1.1.0~beta1build1 all Python interface to libapt-pkg (locales)
ii python-crypto 2.6.1-6ubuntu0.16.04.2 amd64 cryptographic algorithms and protocols for Python
ii python-dnspython 1.12.0-1 all DNS toolkit for Python
ii python-ldb 2:1.1.24-1ubuntu3 amd64 Python bindings for LDB
ii python-minimal 2.7.11-1 amd64 minimal subset of the Python language (default version)
ii python-pycurl 7.43.0-1ubuntu1 amd64 Python bindings to libcurl
ii python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 Python bindings for Samba
ii python-software-properties 0.96.20.7 all manage the repositories that you install software from
ii python-talloc 2.1.5-2 amd64 hierarchical pool based memory allocator - Python bindings
ii python-tdb 1.3.8-2 amd64 Python bindings for TDB
ii python2.7 2.7.12-1ubuntu0~16.04.3 amd64 Interactive high-level object-oriented language (version 2.7)
ii python2.7-minimal 2.7.12-1ubuntu0~16.04.3 amd64 Minimal subset of the Python language (version 2.7)
ii python3 3.5.1-3 amd64 interactive high-level object-oriented language (default python3 version)
ii python3-apport 2.20.1-0ubuntu2.15 all Python 3 library for Apport crash report handling
ii python3-apt 1.1.0~beta1build1 amd64 Python 3 interface to libapt-pkg
ii python3-chardet 2.3.0-2 all universal character encoding detector for Python3
ii python3-commandnotfound 0.3ubuntu16.04.2 all Python 3 bindings for command-not-found.
ii python3-dbus 1.2.0-3 amd64 simple interprocess messaging system (Python 3 interface)
ii python3-debian 0.1.27ubuntu2 all Python 3 modules to work with Debian-related data formats
ii python3-distupgrade 1:16.04.23 all manage release upgrades
ii python3-gdbm 3.5.1-1 amd64 GNU dbm database support for Python 3.x
ii python3-gi 3.20.0-0ubuntu1 amd64 Python 3 bindings for gobject-introspection libraries
ii python3-minimal 3.5.1-3 amd64 minimal subset of the Python language (default python3 version)
ii python3-newt 0.52.18-1ubuntu2 amd64 NEWT module for Python3
ii python3-pkg-resources 20.7.0-1 all Package Discovery and Resource Access using pkg_resources
ii python3-problem-report 2.20.1-0ubuntu2.15 all Python 3 library to handle problem reports
ii python3-pycurl 7.43.0-1ubuntu1 amd64 Python bindings to libcurl (Python 3)
ii python3-pyinotify 0.9.6-0fakesync1 all simple Linux inotify Python bindings
ii python3-requests 2.9.1-3 all elegant and simple HTTP library for Python3, built for human beings
ii python3-six 1.10.0-3 all Python 2 and 3 compatibility library (Python 3 interface)
ii python3-software-properties 0.96.20.7 all manage the repositories that you install software from
ii python3-systemd 231-2build1 amd64 Python 3 bindings for systemd
ii python3-update-manager 1:16.04.12 all python 3.x module for update-manager
ii python3-urllib3 1.13.1-2ubuntu0.16.04.1 all HTTP library with thread-safe connection pooling for Python3
ii python3.5 3.5.2-2ubuntu0~16.04.4 amd64 Interactive high-level object-oriented language (version 3.5)
ii python3.5-minimal 3.5.2-2ubuntu0~16.04.4 amd64 Minimal subset of the Python language (version 3.5)
ii readline-common 6.3-8ubuntu2 all GNU readline and history libraries, common files
ii rename 0.20-4 all Perl extension for renaming multiple files
ii resolvconf 1.78ubuntu6 all name server information handler
ii rsync 3.1.1-3ubuntu1.2 amd64 fast, versatile, remote (and local) file-copying tool
ii rsyslog 8.16.0-1ubuntu3 amd64 reliable system and kernel logging daemon
ii run-one 1.17-0ubuntu1 all run just one instance of a command and its args at a time
ii samba 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 SMB/CIFS file, print, and login server for Unix
ii samba-common 2:4.3.11+dfsg-0ubuntu0.16.04.12 all common files used by both the Samba server and client
ii samba-common-bin 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 Samba common files used by both the server and the client
ii samba-dsdb-modules 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 Samba Directory Services Database
ii samba-libs 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 Samba core libraries
ii samba-vfs-modules 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 Samba Virtual FileSystem plugins
ii screen 4.3.1-2build1 amd64 terminal multiplexer with VT100/ANSI terminal emulation
ii sed 4.2.2-7 amd64 The GNU sed stream editor
ii sensible-utils 0.0.9 all Utilities for sensible alternative selection
ii sgml-base 1.26+nmu4ubuntu1 all SGML infrastructure and SGML catalog file support
ii shared-mime-info 1.5-2ubuntu0.1 amd64 FreeDesktop.org shared MIME database and spec
ii shtool 2.0.8-8 all portable shell tool from the GNU project
ii smbclient 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 command-line SMB/CIFS clients for Unix
ii snapd 2.29.4.2 amd64 Daemon and tooling that enable snap packages
ii software-properties-common 0.96.20.7 all manage the repositories that you install software from (common)
ii sosreport 3.5-1~ubuntu16.04.2 amd64 Set of tools to gather troubleshooting data from a system
ii squashfs-tools 1:4.3-3ubuntu2.16.04.1 amd64 Tool to create and append to squashfs filesystems
ii ssh-import-id 5.5-0ubuntu1 all securely retrieve an SSH public key and install it locally
ii ssl-cert 1.0.37 all simple debconf wrapper for OpenSSL
ii strace 4.11-1ubuntu3 amd64 System call tracer
ii sudo 1.8.16-0ubuntu1.5 amd64 Provide limited super user privileges to specific users
ii systemd 229-4ubuntu21.1 amd64 system and service manager
ii systemd-sysv 229-4ubuntu21.1 amd64 system and service manager - SysV links
ii sysv-rc 2.88dsf-59.3ubuntu2 all System-V-like runlevel change mechanism
ii sysvinit-utils 2.88dsf-59.3ubuntu2 amd64 System-V-like utilities
ii tar 1.28-2.1ubuntu0.1 amd64 GNU version of the tar archiving utility
ii tasksel 3.34ubuntu3 all tool for selecting tasks for installation on Debian systems
ii tasksel-data 3.34ubuntu3 all official tasks used for installation of Debian systems
ii tcpd 7.6.q-25 amd64 Wietse Venema's TCP wrapper utilities
ii tcpdump 4.9.2-0ubuntu0.16.04.1 amd64 command-line network traffic analyzer
ii tdb-tools 1.3.8-2 amd64 Trivial Database - bundled binaries
ii telnet 0.17-40 amd64 basic telnet client
ii time 1.7-25.1 amd64 GNU time program for measuring CPU resource usage
ii tmux 2.1-3build1 amd64 terminal multiplexer
ii traceroute 1:2.0.21-1 amd64 Traces the route taken by packets over an IPv4/IPv6 network
ii ttf-dejavu-core 2.35-1 all transitional dummy package
ii tzdata 2017c-0ubuntu0.16.04 all time zone and daylight-saving time data
ii ubuntu-cloudimage-keyring 2013.11.11 all GnuPG keys of the Ubuntu Cloud Image builder
ii ubuntu-keyring 2012.05.19 all GnuPG keys of the Ubuntu archive
ii ubuntu-minimal 1.361.1 amd64 Minimal core of Ubuntu
ii ubuntu-release-upgrader-core 1:16.04.23 all manage release upgrades
ii ubuntu-server 1.361.1 amd64 The Ubuntu Server system
ii ubuntu-standard 1.361.1 amd64 The Ubuntu standard system
ii ucf 3.0036 all Update Configuration File(s): preserve user changes to config files
ii udev 229-4ubuntu21.1 amd64 /dev/ and hotplug management daemon
ii ufw 0.35-0ubuntu2 all program for managing a Netfilter firewall
ii uidmap 1:4.2-3.1ubuntu5.3 amd64 programs to help use subuids
ii unattended-upgrades 0.90ubuntu0.9 all automatic installation of security upgrades
ii unzip 6.0-20ubuntu1 amd64 De-archiver for .zip files
ii update-inetd 4.43 all inetd configuration file updater
ii update-manager-core 1:16.04.12 all manage release upgrades
ii update-notifier-common 3.168.7 all Files shared between update-notifier and other packages
ii ureadahead 0.100.0-19 amd64 Read required files in advance
ii usbutils 1:007-4 amd64 Linux USB utilities
ii util-linux 2.27.1-6ubuntu3.4 amd64 miscellaneous system utilities
ii uuid-runtime 2.27.1-6ubuntu3.4 amd64 runtime components for the Universally Unique ID library
ii vim 2:7.4.1689-3ubuntu1.2 amd64 Vi IMproved - enhanced vi editor
ii vim-common 2:7.4.1689-3ubuntu1.2 amd64 Vi IMproved - Common files
ii vim-runtime 2:7.4.1689-3ubuntu1.2 all Vi IMproved - Runtime files
ii vim-tiny 2:7.4.1689-3ubuntu1.2 amd64 Vi IMproved - enhanced vi editor - compact version
ii vlan 1.9-3.2ubuntu1.16.04.4 amd64 user mode programs to enable VLANs on your ethernet devices
ii wget 1.17.1-1ubuntu1.3 amd64 retrieves files from the web
ii whiptail 0.52.18-1ubuntu2 amd64 Displays user-friendly dialog boxes from shell scripts
ii whois 5.2.11 amd64 intelligent WHOIS client
ii winbind 2:4.3.11+dfsg-0ubuntu0.16.04.12 amd64 service to resolve user and group information from Windows NT servers
ii wireless-regdb 2015.07.20-1ubuntu1 all wireless regulatory database
ii xauth 1:1.0.9-1ubuntu2 amd64 X authentication utility
ii xdg-user-dirs 0.15-2ubuntu6 amd64 tool to manage well known user directories
ii xfsprogs 4.3.0+nmu1ubuntu1.1 amd64 Utilities for managing the XFS filesystem
ii xkb-data 2.16-1ubuntu1 all X Keyboard Extension (XKB) configuration data
ii xml-core 0.13+nmu2 all XML infrastructure and XML catalog file support
ii xz-utils 5.1.1alpha+20120614-2ubuntu2 amd64 XZ-format compression utilities
ii zerofree 1.0.3-1 amd64 zero free blocks from ext2, ext3 and ext4 file-systems
ii zip 3.0-11 amd64 Archiver for .zip files
ii zlib1g 1:1.2.8.dfsg-2ubuntu4.1 amd64 compression library - runtime
ii zlib1g-dev 1:1.2.8.dfsg-2ubuntu4.1 amd64 compression library - development
rc libapache2-mod-php7.0 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 server-side, HTML-embedded scripting language (Apache 2 module)
rc mysql-server-5.7 5.7.21-0ubuntu0.16.04.1 amd64 MySQL database server binaries and system database setup
rc php-smbclient 0.9.0-1+ubuntu16.04.1+deb.sury.org+2 amd64 PHP wrapper for libsmbclient
rc php-ssh2 1.1.2+0.13-1+ubuntu16.04.1+deb.sury.org+1 amd64 Bindings for the libssh2 library
rc php7.0-cli 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 command-line interpreter for the PHP scripting language
rc php7.0-common 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 documentation, examples and common module for PHP
rc php7.0-curl 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 CURL module for PHP
rc php7.0-gd 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 GD module for PHP
rc php7.0-imap 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 IMAP module for PHP
rc php7.0-intl 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 Internationalisation module for PHP
rc php7.0-json 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 JSON module for PHP
rc php7.0-ldap 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 LDAP module for PHP
rc php7.0-mbstring 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 MBSTRING module for PHP
rc php7.0-mcrypt 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 libmcrypt module for PHP
rc php7.0-mysql 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 MySQL module for PHP
rc php7.0-opcache 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 Zend OpCache module for PHP
rc php7.0-pgsql 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 PostgreSQL module for PHP
rc php7.0-readline 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 readline module for PHP
rc php7.0-sqlite3 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 SQLite3 module for PHP
rc php7.0-xml 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 DOM, SimpleXML, WDDX, XML, and XSL module for PHP
rc php7.0-zip 7.0.30-1+ubuntu16.04.1+deb.sury.org+1 amd64 Zip module for PHP
25203 - Enumerate IPv4 Interfaces via SSH
Synopsis
Nessus was able to enumerate the IPv4 interfaces on the remote host.
Description
Nessus was able to enumerate the network interfaces configured with IPv4 addresses by connecting to the remote host via SSH using the supplied credentials.
Solution
Disable any unused IPv4 interfaces.
Risk Factor
None
Plugin Information:
Published: 2007/05/11, Modified: 2017/01/26
Plugin Output

tcp/0


The following IPv4 addresses are set on the remote host :

- 172.16.0.4 (on interface enp3s4f0)
- 36.66.212.109 (on interface enp3s4f1)
- 127.0.0.1 (on interface lo)
25220 - TCP/IP Timestamps Supported
Synopsis
The remote service implements TCP timestamps.
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/05/16, Modified: 2011/03/20
Plugin Output

tcp/0

33276 - Enumerate MAC Addresses via SSH
Synopsis
Nessus was able to enumerate MAC addresses on the remote host.
Description
Nessus was able to enumerate MAC addresses by connecting to the remote host via SSH with the supplied credentials.
Solution
Disable any unused interfaces.
Risk Factor
None
Plugin Information:
Published: 2008/06/30, Modified: 2017/01/26
Plugin Output

tcp/0


The following MAC addresses exist on the remote host :

- 3c:d9:2b:fe:7e:3e (interface enp3s4f0)
- 3c:d9:2b:fe:7e:3f (interface enp3s4f1)
35716 - Ethernet Card Manufacturer Detection
Synopsis
The manufacturer can be identified from the Ethernet OUI.
Description
Each ethernet MAC address starts with a 24-bit Organizationally Unique Identifier (OUI). These OUIs are registered by IEEE.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/02/19, Modified: 2017/11/17
Plugin Output

tcp/0


The following card manufacturers were identified :

3c:d9:2b:fe:7e:3f : Hewlett Packard
3c:d9:2b:fe:7e:3e : Hewlett Packard
45590 - Common Platform Enumeration (CPE)
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/04/21, Modified: 2017/06/06
Plugin Output

tcp/0


The remote operating system matched the following CPE :

cpe:/o:canonical:ubuntu_linux:16.04

Following application CPE's matched on the remote system :

cpe:/a:openbsd:openssh:7.2
cpe:/a:samba:samba:4.3.11
cpe:/a:apache:http_server:2.4.18
cpe:/a:isc:bind:9.10.3:p4
54615 - Device Type
Synopsis
It is possible to guess the remote device type.
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/05/23, Modified: 2011/05/23
Plugin Output

tcp/0

Remote device type : general-purpose
Confidence level : 100
55472 - Device Hostname
Synopsis
It was possible to determine the remote system hostname.
Description
This plugin reports a device's hostname collected via SSH or WMI.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/06/30, Modified: 2018/06/06
Plugin Output

tcp/0


Hostname : sierra
sierra (hostname command)
56468 - Time of Last System Startup
Synopsis
The system has been started.
Description
Using the supplied credentials, Nessus was able to determine when the host was last started.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/10/12, Modified: 2018/06/19
Plugin Output

tcp/0


reboot system boot 4.4.0-112-generi Tue Jun 26 08:27 still running
reboot system boot 4.4.0-112-generi Thu Jun 7 15:45 - 08:24 (18+16:39)
reboot system boot 4.4.0-112-generi Mon Jun 4 10:19 - 08:24 (21+22:04)
reboot system boot 4.4.0-112-generi Sun Jun 3 22:50 - 08:24 (22+09:33)

wtmp begins Sun Jun 3 22:50:49 2018
58651 - Netstat Active Connections
Synopsis
Active connections are enumerated via the 'netstat' command.
Description
This plugin runs 'netstat' on the remote machine to enumerate all active 'ESTABLISHED' or 'LISTENING' tcp/udp connections.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2012/04/10, Modified: 2018/06/19
Plugin Output

tcp/0


Netstat output :
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:953 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN
tcp 0 0 36.66.212.109:53 0.0.0.0:* LISTEN
tcp 0 0 172.16.0.4:53 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN
tcp 0 0 127.0.2.1:53 0.0.0.0:* LISTEN
tcp 0 88 172.16.0.4:22 172.16.1.201:59552 ESTABLISHED
tcp 0 0 36.66.212.109:443 115.178.250.184:33090 FIN_WAIT2
tcp 0 0 172.16.0.4:22 172.16.1.66:49608 ESTABLISHED
tcp 0 0 36.66.212.109:443 115.178.250.184:5376 FIN_WAIT2
tcp 0 0 36.66.212.109:443 115.178.250.184:59190 FIN_WAIT2
tcp 0 0 36.66.212.109:443 115.178.250.184:29323 FIN_WAIT2
tcp6 0 0 :::22 :::* LISTEN
tcp6 0 0 :::445 :::* LISTEN
tcp6 0 0 :::139 :::* LISTEN
tcp6 0 0 :::53 :::* LISTEN
udp 0 0 0.0.0.0:45530 0.0.0.0:*
udp 0 0 36.66.212.109:53 0.0.0.0:*
udp 0 0 172.16.0.4:53 0.0.0.0:*
udp 0 0 127.0.0.1:53 0.0.0.0:*
udp 0 0 127.0.2.1:53 0.0.0.0:*
udp 0 0 172.16.1.255:137 0.0.0.0:*
udp 0 0 172.16.0.4:137 0.0.0.0:*
udp 0 0 36.66.212.111:137 0.0.0.0:*
udp 0 0 36.66.212.109:137 0.0.0.0:*
udp 0 0 0.0.0.0:137 0.0.0.0:*
udp 0 0 172.16.1.255:138 0.0.0.0:*
udp 0 0 172.16.0.4:138 0.0.0.0:*
udp 0 0 36.66.212.111:138 0.0.0.0:*
udp 0 0 36.66.212.109:138 0.0.0.0:*
udp 0 0 0.0.0.0:138 0.0.0.0:*
udp6 0 0 :::53 :::*
59713 - Active Inbound Connection From Host Listed in Known Bot Database
Synopsis
According to a third-party database, the remote host is receiving an inbound connection from a host that is listed as part of a botnet.
Description
According to the output from netstat, the remote host has an inbound connection from one or more hosts that are listed in a public database as part of a botnet.
Solution
Determine which services the botnet hosts are connected to, and investigate further if necessary.
Risk Factor
None
Plugin Information:
Published: 2012/06/26, Modified: 2018/05/16
Plugin Output

tcp/0


The host has accepted an inbound connection from the following IP address
that is flagged as part of a botnet :

IP address : 115.178.250.184
Connected to local port(s) : 36.66.212.109:443
Date flagged : 08/Jan/2016
64582 - Netstat Connection Information
Synopsis
Nessus was able to parse the results of the 'netstat' command on the remote host.
Description
The remote host has listening ports or established connections that Nessus was able to extract from the results of the 'netstat' command.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/02/13, Modified: 2018/05/16
Plugin Output

tcp/0

tcp4 (listen)
src: [host=0.0.0.0, port=22]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=127.0.0.1, port=953]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=0.0.0.0, port=443]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=0.0.0.0, port=445]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=127.0.0.1, port=3306]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=0.0.0.0, port=139]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=0.0.0.0, port=80]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=36.66.212.109, port=53]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=172.16.0.4, port=53]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=127.0.0.1, port=53]
dst: [host=0.0.0.0, port=*]

tcp4 (listen)
src: [host=127.0.2.1, port=53]
dst: [host=0.0.0.0, port=*]

tcp4 (established)
src: [host=172.16.0.4, port=22]
dst: [host=172.16.1.201, port=59552]

tcp4 (established)
src: [host=36.66.212.109, port=443]
dst: [host=115.178.250.184, port=33090]

tcp4 (established)
src: [host=172.16.0.4, port=22]
dst: [host=172.16.1.66, port=49608]

tcp4 (established)
src: [host=36.66.212.109, port=443]
dst: [host=115.178.250.184, port=5376]

tcp4 (established)
src: [host=36.66.212.109, port=443]
dst: [host=115.178.250.184, port=59190]

tcp4 (established)
src: [host=36.66.212.109, port=443]
dst: [host=115.178.250.184, port=29323]

tcp6 (listen)
src: [host=::, port=22]
dst: [host=::, port=*]

tcp6 (listen)
src: [host=::, port=445]
dst: [host=::, port=*]

tcp6 (listen)
src: [host=::, port=139]
dst: [host=::, port=*]

tcp6 (listen)
src: [host=::, port=53]
dst: [host=::, port=*]

udp4 (listen)
src: [host=0.0.0.0, port=45530]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=36.66.212.109, port=53]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=172.16.0.4, port=53]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=127.0.0.1, port=53]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=127.0.2.1, port=53]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=172.16.1.255, port=137]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=172.16.0.4, port=137]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=36.66.212.111, port=137]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=36.66.212.109, port=137]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=0.0.0.0, port=137]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=172.16.1.255, port=138]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=172.16.0.4, port=138]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=36.66.212.111, port=138]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=36.66.212.109, port=138]
dst: [host=0.0.0.0, port=*]

udp4 (listen)
src: [host=0.0.0.0, port=138]
dst: [host=0.0.0.0, port=*]

udp6 (listen)
src: [host=::, port=53]
dst: [host=::, port=*]
66334 - Patch Report
Synopsis
The remote host is missing several patches.
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.
Solution
Install the patches listed below.
Risk Factor
None
Plugin Information:
Published: 2013/07/08, Modified: 2018/06/20
Plugin Output

tcp/0



. You need to take the following 19 actions :


[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : curl vulnerabilities (USN-3648-1) (109893) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 6 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : file vulnerabilities (USN-3686-1) (110552) ]

+ Action to take : Update the affected file and / or libmagic1 packages.

+Impact : Taking this action will resolve 5 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : git vulnerabilities (USN-3671-1) (110395) ]

+ Action to take : Update the affected git package.

+Impact : Taking this action will resolve 2 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : gnupg, gnupg2 vulnerabilities (USN-3675-1) (110475) ]

+ Action to take : Update the affected gnupg and / or gpg packages.

+Impact : Taking this action will resolve 2 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libgcrypt11, libgcrypt20 vulnerability (USN-3689-1) (110623) ]

+ Action to take : Update the affected libgcrypt11 and / or libgcrypt20 packages.


[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : perl vulnerability (USN-3684-1) (110533) ]

+ Action to take : Update the affected perl package.

+Impact : Taking this action will resolve 7 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : procps vulnerabilities (USN-3658-1) (110094) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 5 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : wget vulnerability (USN-3643-1) (109681) ]

+ Action to take : Update the affected wget package.


[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : icu vulnerability (USN-3610-1) (108708) ]

+ Action to take : Update the affected libicu52, libicu55 and / or libicu57 packages.


[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : isc-dhcp vulnerabilities (USN-3586-1) (107117) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 4 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : openssl vulnerability (USN-3628-1) (109200) ]

+ Action to take : Update the affected libssl1.0.0 package.

+Impact : Taking this action will resolve 2 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : patch vulnerabilities (USN-3624-1) (109002) ]

+ Action to take : Update the affected patch package.

+Impact : Taking this action will resolve 3 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : python-crypto vulnerability (USN-3616-1) (108833) ]

+ Action to take : Update the affected python-crypto and / or python3-crypto packages.


[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : samba vulnerabilities (USN-3595-1) (108335) ]

+ Action to take : Update the affected samba and / or samba-dsdb-modules packages.

+Impact : Taking this action will resolve 2 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : sensible-utils vulnerability (USN-3584-1) (107023) ]

+ Action to take : Update the affected sensible-utils package.


[ Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : tiff vulnerabilities (USN-3606-1) (108657) ]

+ Action to take : Update the affected libtiff-tools and / or libtiff5 packages.

+Impact : Taking this action will resolve 36 different vulnerabilities (CVEs).



[ Ubuntu 14.04 LTS / 16.04 LTS : elfutils vulnerabilities (USN-3670-1) (110382) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 9 different vulnerabilities (CVEs).



[ Ubuntu 16.04 LTS / 17.10 / 18.04 LTS : apport vulnerability (USN-3664-1) (110263) ]

+ Action to take : Update the affected apport package.


[ Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3676-1) (110476) ]

+ Action to take : Update the affected packages.

+Impact : Taking this action will resolve 70 different vulnerabilities (CVEs).


97993 - OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library)
Synopsis
Information about the remote host can be disclosed via an authenticated session.
Description
Nessus was able to login to the remote host using SSH or local commands and extract the list of installed packages.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2017/05/30, Modified: 2018/06/11
Plugin Output

tcp/0


It was possible to log into the remote host via SSH using 'password' authentication.

The output of "uname -a" is :
Linux sierra 4.4.0-112-generic #135-Ubuntu SMP Fri Jan 19 11:48:36 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux

The remote Debian system is :
stretch/sid

This is a Ubuntu system

Local security checks have been enabled for this host.
Runtime : 3.925144 seconds
102094 - SSH Commands Require Privilege Escalation
Synopsis
This plugin reports the SSH commands that failed with a response indicating that privilege escalation is required to run them.
Description
This plugin reports the SSH commands that failed with a response indicating that privilege escalation is required to run them. Either privilege escalation credentials were not provided, or the command failed to run with the provided privilege escalation credentials.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2017/08/01, Modified: 2018/05/24
Plugin Output

tcp/0


Login account : puskom
Commands failed due to lack of privilege escalation :
- Escalation account : (none)
Escalation method : (none)
Plugins :
- Plugin Filename : enumerate_aws_ami_nix.nasl
Plugin ID : 90191
Plugin Name : Amazon Web Services EC2 Instance Metadata Enumeration (Unix)
- Command : "dmidecode -s system-version 2>&1"
Response : "/sys/firmware/dmi/tables/smbios_entry_point: Permission denied\n/dev/mem: Permission denied"
Error : ""
- Plugin Filename : ssh_get_info2.nasl
Plugin ID : 97993
Plugin Name : OS Identification and Installed Software Enumeration over SSH v2 (Using New SSH Library)
- Command : "lsmod | grep -q iptable_filter && iptables -L -n -v -t filter"
Response : null
Error : "\niptables v1.6.0: can't initialize iptables table `filter': Permission denied (you must be root)\nPerhaps iptables or your kernel needs to be upgraded.\n"

10287 - Traceroute Information
Synopsis
It was possible to obtain traceroute information.
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/11/27, Modified: 2017/08/22
Plugin Output

udp/0

For your information, here is the traceroute from 172.16.1.201 to 172.16.0.4 :
172.16.1.201
172.16.0.4

Hop Count: 1

10267 - SSH Server Type and Version Information
Synopsis
An SSH server is listening on this port.
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/10/12, Modified: 2017/12/19
Plugin Output

tcp/22


SSH version : SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.4
SSH supported authentication : publickey,password
10881 - SSH Protocol Versions Supported
Synopsis
A SSH server is running on the remote host.
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/03/06, Modified: 2017/05/30
Plugin Output

tcp/22

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

tcp/22

Port 22/tcp was found to be open
22964 - Service Detection
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/08/19, Modified: 2018/05/03
Plugin Output

tcp/22

An SSH server is running on this port.
39520 - Backported Security Patch Detection (SSH)
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote SSH server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/22


Local checks have been enabled.
70657 - SSH Algorithms and Languages Supported
Synopsis
An SSH server is listening on this port.
Description
This script detects which algorithms and languages are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/10/28, Modified: 2017/08/28
Plugin Output

tcp/22


Nessus negotiated the following encryption algorithm with the server :

The server supports the following options for kex_algorithms :

curve25519-sha256@libssh.org
diffie-hellman-group-exchange-sha256
diffie-hellman-group14-sha1
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521

The server supports the following options for server_host_key_algorithms :

ecdsa-sha2-nistp256
rsa-sha2-256
rsa-sha2-512
ssh-ed25519
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for encryption_algorithms_server_to_client :

aes128-ctr
aes128-gcm@openssh.com
aes192-ctr
aes256-ctr
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

The server supports the following options for mac_algorithms_client_to_server :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for mac_algorithms_server_to_client :

hmac-sha1
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com
110385 - Authentication Success Insufficient Access
Synopsis
Nessus was able to log into the remote host using the provided credentials. The provided credentials were not sufficient to do all requested local checks.
Description
Nessus was able to execute credentialed checks because it was possible to log into the remote host using provided credentials, however the credentials were not sufficiently privileged to allow all requested local checks.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2018/06/06, Modified: 2018/06/06
Plugin Output

tcp/22


Nessus was able to log into the following host, however
the supplied credentials did not have sufficient privileges
for all planned checks:

Protocol : SSH
Port : 22

11002 - DNS Server Detection
Synopsis
A DNS server is listening on the remote host.
Description
The remote service is a Domain Name System (DNS) server, which provides a mapping between hostnames and IP addresses.
See Also
Solution
Disable this service if it is not needed or restrict access to internal hosts only if the service is available externally.
Risk Factor
None
Plugin Information:
Published: 2003/02/13, Modified: 2017/05/16
Plugin Output

tcp/53

72779 - DNS Server Version Detection
Synopsis
Nessus was able to obtain version information on the remote DNS server.
Description
Nessus was able to obtain version information by sending a special TXT record query to the remote host.

Note that this version is not necessarily accurate and could even be forged, as some DNS servers send the information based on a configuration file.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2014/03/03, Modified: 2014/11/05
Plugin Output

tcp/53


DNS server answer for "version.bind" (over TCP) :

9.10.3-P4-Ubuntu

12217 - DNS Server Cache Snooping Remote Information Disclosure
Synopsis
The remote DNS server is vulnerable to cache snooping attacks.
Description
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set.

This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited.

For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution, they would be able to use this attack to build a statistical model regarding company usage of that financial institution. Of course, the attack can also be used to find B2B partners, web-surfing patterns, external mail servers, and more.

Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported.
See Also
Solution
Contact the vendor of the DNS software for a fix.
Risk Factor
Medium
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information:
Published: 2004/04/27, Modified: 2016/12/06
Plugin Output

udp/53


Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34
10028 - DNS Server BIND version Directive Remote Version Detection
Synopsis
It is possible to obtain the version number of the remote DNS server.
Description
The remote host is running BIND or another DNS server that reports its version number when it receives a special request for the text 'version.bind' in the domain 'chaos'.

This version is not necessarily accurate and could even be forged, as some DNS servers send the information based on a configuration file.
Solution
It is possible to hide the version number of BIND by using the 'version' directive in the 'options' section in named.conf.
Risk Factor
None
References
XREF OSVDB:23
Plugin Information:
Published: 1999/10/12, Modified: 2018/04/03
Plugin Output

udp/53


Version : 9.10.3-P4-Ubuntu
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

udp/53

Port 53/udp was found to be open
35371 - DNS Server hostname.bind Map Hostname Disclosure
Synopsis
The DNS server discloses the remote host name.
Description
It is possible to learn the remote host name by querying the remote DNS server for 'hostname.bind' in the CHAOS domain.
Solution
It may be possible to disable this feature. Consult the vendor's documentation for more information.
Risk Factor
None
Plugin Information:
Published: 2009/01/15, Modified: 2011/09/14
Plugin Output

udp/53


The remote host name is :

sierra

10107 - HTTP Server Type and Version
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/01/04, Modified: 2018/05/23
Plugin Output

tcp/80

The remote web server type is :

Apache/2.4.18 (Ubuntu)
10386 - Web Server No 404 Error Code Check
Synopsis
The remote web server does not return 404 error codes.
Description
The remote web server is configured such that it does not return '404 Not Found' error codes when a nonexistent file is requested, perhaps returning instead a site map, search page or authentication page.

Nessus has enabled some counter measures for this. However, they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/04/28, Modified: 2015/10/13
Plugin Output

tcp/80



CGI scanning will be disabled for this host because the host responds
to requests for non-existent URLs with HTTP code 301
rather than 404. The requested URL was :

http://siakad.poltekom.ac.id/GARPKdqDsQyb.html
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

tcp/80

Port 80/tcp was found to be open
22964 - Service Detection
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/08/19, Modified: 2018/05/03
Plugin Output

tcp/80

A web server is running on this port.
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/01/30, Modified: 2017/11/13
Plugin Output

tcp/80


Response Code : HTTP/1.1 301 Moved Permanently

Protocol version : HTTP/1.1
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Tue, 26 Jun 2018 01:49:28 GMT
Server: Apache/2.4.18 (Ubuntu)
Location: https://siakad.poltekom.ac.id/
Content-Length: 325
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

Response Body :

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://siakad.poltekom.ac.id/">here</a>.</p>
<hr>
<address>Apache/2.4.18 (Ubuntu) Server at siakad.poltekom.ac.id Port 80</address>
</body></html>
39521 - Backported Security Patch Detection (WWW)
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote HTTP server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/80


Local checks have been enabled.
48204 - Apache HTTP Server Version
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the version number from the banner.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/07/30, Modified: 2018/01/22
Plugin Output

tcp/80


URL : http://siakad.poltekom.ac.id/
Version : 2.4.99
backported : 1
os : ConvertedUbuntu

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure
Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 1999/10/12, Modified: 2018/06/06
Plugin Output

udp/137

The following 7 NetBIOS names have been gathered :

SIERRA = Computer name
SIERRA = Messenger Service
SIERRA = File Server Service
__MSBROWSE__ = Master Browser
WORKGROUP = Workgroup / Domain name
WORKGROUP = Master Browser
WORKGROUP = Browser Service Elections

This SMB server seems to be a Samba server - its MAC address is NULL.
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

udp/137

Port 137/udp was found to be open
43815 - NetBIOS Multiple IP Address Enumeration
Synopsis
The remote host is configured with multiple IP addresses.
Description
By sending a special NetBIOS query, Nessus was able to detect the use of multiple IP addresses on the remote host. This indicates the host may be running virtualization software, a VPN client, or has multiple network interfaces.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/01/06, Modified: 2011/09/02
Plugin Output

udp/137


The remote host appears to be using the following IP addresses :

- 172.16.0.4
- 36.66.212.109

14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

udp/138

Port 138/udp was found to be open

11011 - Microsoft Windows SMB Service Detection
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/06/05, Modified: 2015/06/02
Plugin Output

tcp/139


An SMB server is running on this port.
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

tcp/139

Port 139/tcp was found to be open

10107 - HTTP Server Type and Version
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/01/04, Modified: 2018/05/23
Plugin Output

tcp/443

The remote web server type is :

Apache/2.4.18 (Ubuntu)
10302 - Web Server robots.txt Information Disclosure
Synopsis
The remote web server contains a 'robots.txt' file.
Description
The remote host contains a file named 'robots.txt' that is intended to prevent web 'robots' from visiting certain directories in a website for maintenance or indexing purposes. A malicious user may also be able to use the contents of this file to learn of sensitive documents or directories on the affected site and either retrieve them directly or target them for other attacks.
See Also
Solution
Review the contents of the site's robots.txt file, use Robots META tags instead of entries in the robots.txt file, and/or adjust the web server's access controls to limit access to sensitive material.
Risk Factor
None
References
XREF OSVDB:238
Plugin Information:
Published: 1999/10/12, Modified: 2014/05/09
Plugin Output

tcp/443

Contents of robots.txt :

User-agent: *
Disallow: /
10863 - SSL Certificate Information
Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2008/05/19, Modified: 2015/12/30
Plugin Output

tcp/443

Subject Name:

Common Name: *.poltekom.ac.id

Issuer Name:

Country: US
Organization: GeoTrust Inc.
Common Name: RapidSSL SHA256 CA

Serial Number: 56 AF 5D 1C AB AC 81 6B 0C 79 5A 7C 05 97 F9 CA

Version: 3

Signature Algorithm: SHA-256 With RSA Encryption

Not Valid Before: Oct 02 00:00:00 2017 GMT
Not Valid After: Oct 02 23:59:59 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 2048 bits
Public Key: 00 BD 6F A8 45 D9 F7 15 88 58 C7 54 9A 34 AA D8 84 C3 A2 A2
E7 3C D7 1D DA 5F AE 7D 0D F3 6D 1B BD 70 F9 C8 30 D2 48 BC
9C 72 31 A6 8B 4F B1 04 55 46 B5 79 4E DE 55 AF FA D9 EB 71
CF CD 20 80 1A 10 21 BD 85 6D 51 77 10 87 96 26 EE 06 A3 E4
7E 8A 1F E0 7B BD 6C 47 B0 85 17 64 39 A5 45 0F 7E AA A8 D6
BB 72 42 6C 5E A0 CF 19 B5 10 00 D3 B8 19 A7 66 D8 23 77 AF
C4 30 D9 9C F7 F7 99 EA 58 70 70 8C 7D AB AD CB E0 23 85 9E
7F 94 CC F3 5F 77 41 DF DC EF 36 EA 80 D6 58 EF A9 5F 0A 4F
2D 61 82 6D 92 EA 01 13 A1 EE 86 90 05 EC DE E5 61 32 51 24
19 1E A9 43 A3 E7 F8 48 35 B0 5B E6 B0 CA 0C 65 00 5E BB A7
0A 72 0E CB 5D 18 74 63 D9 D1 33 56 74 C9 4C FD 2E E9 E5 34
32 DE 31 8A 36 54 31 B4 14 9D 28 9D 96 0C E9 C0 09 36 FE F1
9B 9F FA A7 1A 04 6B 14 54 0D C3 49 0E C9 81 2B C7
Exponent: 01 00 01

Signature Length: 256 bytes / 2048 bits
Signature: 00 87 21 DC 30 A6 90 56 E7 E7 FA D8 ED 82 EB 6E E5 21 2B D7
68 29 41 F2 30 B3 30 68 1F 9B 53 19 9D 18 76 A8 3F C1 BA 48
1F 1E EA 95 BC B7 E5 BE 1C D3 AB 30 4F 20 14 18 FD 1C 58 DC
6C D4 3A FD 53 CC FB D5 B1 0C D2 79 C3 E7 72 E4 EC 32 BF E0
2E 8C 07 3A 10 63 D5 7B AA 24 89 20 4B 5D 77 6C 93 71 98 66
47 14 27 05 7D D6 62 79 92 CC AA 02 04 19 B0 38 18 03 23 17
94 50 D8 03 5E 17 FD D6 A9 39 8C D2 37 6D 3F 66 FE 2D 90 81
DB 12 CB 28 A2 DD 50 1A 12 33 13 3C 34 2E 9D 11 97 3D AD D4
92 FF BE B6 32 00 25 74 01 9F 4A C0 3B 5B FA BA 08 EC 93 43
51 F3 AD 11 93 73 6E B0 07 88 31 C3 C6 5F 6F B3 71 82 11 A5
C0 6F F6 C4 49 30 A0 96 AE 23 65 98 DF BE 24 5F FC 28 21 79
70 AD B8 5D CE 55 4F 0E 97 DB 5F A3 73 7A C1 67 3A 8A 7C A2
34 95 34 57 32 A5 CA 67 3E FA 53 07 85 EB 9D 87 58

Extension: Subject Alternative Name (2.5.29.17)
Critical: 0
DNS: *.poltekom.ac.id
DNS: poltekom.ac.id


Extension: Basic Constraints (2.5.29.19)
Critical: 0


Extension: CRL Distribution Points (2.5.29.31)
Critical: 0
URI: http://gp.symcb.com/gp.crl


Extension: Policies (2.5.29.32)
Critical: 0
Policy ID #1: 2.23.140.1.2.1
Qualifier ID #1: Certification Practice Statement (1.3.6.1.5.5.7.2.1)
CPS URI: https://www.rapidssl.com/legal


Extension: Authority Key Identifier (2.5.29.35)
Critical: 0
Key Identifier: 97 C2 27 50 9E C2 C9 EC 0C 88 32 C8 7C AD E2 A6 01 4F DA 6F


Extension: Key Usage (2.5.29.15)
Critical: 1
Key Usage: Digital Signature, Key Encipherment


Extension: Extended Key Usage (2.5.29.37)
Critical: 0
Purpose#1: Web Server Authentication (1.3.6.1.5.5.7.3.1)
Purpose#2: Web Client Authentication (1.3.6.1.5.5.7.3.2)


Extension: Authority Information Access (1.3.6.1.5.5.7.1.1)
Critical: 0
Method#1: Online Certificate Status Protocol
URI: http://gp.symcd.com
Method#2: Certificate Authority Issuers
URI: http://gp.symcb.com/gp.crt


Extension: 1.3.6.1.4.1.11129.2.4.2
Critical: 0
Data: 04 81 F0 00 EE 00 75 00 DD EB 1D 2B 7A 0D 4F A6 20 8B 81 AD
81 68 70 7E 2E 8E 9D 01 D5 5C 88 8D 3D 11 C4 CD B6 EC BE CC
00 00 01 5E DA EA 22 AC 00 00 04 03 00 46 30 44 02 20 4E 4C
71 B0 CF 37 B2 4F 99 1B E1 E3 74 6A BD 14 32 62 C7 D2 DC C2
61 94 46 D0 E2 C3 7E 9B A1 0C 02 20 20 7D F2 77 1D 20 73 96
0D CB 9E 29 5E D9 04 6C 1F 20 19 3D 4C 20 B9 BA 5F 28 12 F1
32 70 4F B2 00 75 00 A4 B9 09 90 B4 18 58 14 87 BB 13 A2 CC
67 70 0A 3C 35 98 04 F9 1B DF B8 E3 77 CD 0E C8 0D DC 10 00
00 01 5E DA EA 22 E9 00 00 04 03 00 46 30 44 02 20 70 28 79
61 09 8F 20 74 6C AD E6 F9 B0 E3 29 F3 43 7C 60 68 2E 24 B7
01 81 B4 7C 4D 11 00 84 58 02 20 03 04 31 90 CB 86 C5 88 D5
73 F7 B5 57 80 61 F4 51 6A 9C F4 FF 56 F0 2B D2 23 6E 87 F9
36 39 3D


Fingerprints :

SHA-256 Fingerprint: 3D 95 55 9E 4E EA 9B 3F 8B 92 F0 B6 47 7F 0C BD 89 7D C7 FC
25 AF B9 FA 57 20 AF 41 C5 06 FE A1
SHA-1 Fingerprint: CB 05 DB 9C 34 21 CF 9D A1 0C 04 1F 50 3C 10 8C 8C 0C D0 E9
MD5 Fingerprint: AB 70 FD AE 29 9D BA 2D 0A EC 0F 23 91 36 B1 92
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

tcp/443

Port 443/tcp was found to be open
21643 - SSL Cipher Suites Supported
Synopsis
The remote service encrypts communications using SSL.
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2006/06/05, Modified: 2018/03/29
Plugin Output

tcp/443


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv12
High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-GCM(128) Mac=SHA256
RSA-AES256-SHA384 Kx=RSA Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256
DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256


SSL Version : TLSv11
High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1


SSL Version : TLSv1
High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
22964 - Service Detection
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/08/19, Modified: 2018/05/03
Plugin Output

tcp/443

A TLSv1 server answered on this port.

tcp/443

A web server is running on this port through TLSv1.
24260 - HyperText Transfer Protocol (HTTP) Information
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/01/30, Modified: 2017/11/13
Plugin Output

tcp/443


Response Code : HTTP/1.1 500 Internal Server Error

Protocol version : HTTP/1.1
SSL : yes
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Date: Tue, 26 Jun 2018 01:49:28 GMT
Server: Apache/2.4.18 (Ubuntu)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

Response Body :

<pre>An Error occurred while handling another error:
PDOException: SQLSTATE[HY000] [1698] Access denied for user &#039;siakad&#039;@&#039;localhost&#039; in /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php:686
Stack trace:
#0 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(686): PDO-&gt;__construct(&#039;mysql:host=loca...&#039;, &#039;siakad&#039;, &#039;s14k4dp0lt3k0m&#039;, NULL)
#1 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(612): yii\db\Connection-&gt;createPdoInstance()
#2 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(995): yii\db\Connection-&gt;open()
#3 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(982): yii\db\Connection-&gt;getMasterPdo()
#4 /var/www/html/siakad/vendor/yiisoft/yii2/db/Schema.php(463): yii\db\Connection-&gt;getSlavePdo()
#5 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(880): yii\db\Schema-&gt;quoteValue(&#039;Aktif&#039;)
#6 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(209): yii\db\Connection-&gt;quoteValue(&#039;Aktif&#039;)
#7 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(1096): yii\db\Command-&gt;getRawSql()
#8 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(1117): yii\db\Command-&gt;logQuery(&#039;yii\\db\\Command:...&#039;)
#9 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(410): yii\db\Command-&gt;queryInternal(&#039;fetch&#039;, NULL)
#10 /var/www/html/siakad/vendor/yiisoft/yii2/db/Query.php(274): yii\db\Command-&gt;queryOne()
#11 /var/www/html/siakad/vendor/yiisoft/yii2/db/ActiveQuery.php(292): yii\db\Query-&gt;one(NULL)
#12 /var/www/html/siakad/backend/views/layouts/left.php(76): yii\db\ActiveQuery-&gt;one()
#13 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(336): require(&#039;/var/www/html/s...&#039;)
#14 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(254): yii\base\View-&gt;renderPhpFile(&#039;/var/www/html/s...&#039;, Array)
#15 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(156): yii\base\View-&gt;renderFile(&#039;/var/www/html/s...&#039;, Array, NULL)
#16 /var/www/html/siakad/backend/views/layouts/main.php(50): yii\base\View-&gt;render(&#039;left.php&#039;, Array)
#17 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(336): require(&#039;/var/www/html/s...&#039;)
#18 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(254): yii\base\View-&gt;renderPhpFile(&#039;/var/www/html/s...&#039;, Array)
#19 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(399): yii\base\View-&gt;renderFile(&#039;/var/www/html/s...&#039;, Array, Object(backend\controllers\SiteController))
#20 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(385): yii\base\Controller-&gt;renderContent(&#039;&lt;section class=...&#039;)
#21 /var/www/html/siakad/vendor/yiisoft/yii2/web/ErrorAction.php(139): yii\base\Controller-&gt;render(&#039;error&#039;, Array)
#22 /var/www/html/siakad/vendor/yiisoft/yii2/web/ErrorAction.php(118): yii\web\ErrorAction-&gt;renderHtmlResponse()
#23 [internal function]: yii\web\ErrorAction-&gt;run()
#24 /var/www/html/siakad/vendor/yiisoft/yii2/base/Action.php(94): call_user_func_array(Array, Array)
#25 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(157): yii\base\Action-&gt;runWithParams(Array)
#26 /var/www/html/siakad/vendor/yiisoft/yii2/base/Module.php(528): yii\base\Controller-&gt;runAction(&#039;error&#039;, Array)
#27 /var/www/html/siakad/vendor/yiisoft/yii2/web/ErrorHandler.php(108): yii\base\Module-&gt;runAction(&#039;site/error&#039;)
#28 /var/www/html/siakad/vendor/yiisoft/yii2/base/ErrorHandler.php(111): yii\web\ErrorHandler-&gt;renderException(Object(yii\web\ForbiddenHttpException))
#29 [internal function]: yii\base\ErrorHandler-&gt;handleException(Object(yii\web\ForbiddenHttpException))
#30 {main}

Next yii\db\Exception: SQLSTATE[HY000] [1698] Access denied for user &#039;siakad&#039;@&#039;localhost&#039; in /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php:623
Stack trace:
#0 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(995): yii\db\Connection-&gt;open()
#1 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(982): yii\db\Connection-&gt;getMasterPdo()
#2 /var/www/html/siakad/vendor/yiisoft/yii2/db/Schema.php(463): yii\db\Connection-&gt;getSlavePdo()
#3 /var/www/html/siakad/vendor/yiisoft/yii2/db/Connection.php(880): yii\db\Schema-&gt;quoteValue(&#039;Aktif&#039;)
#4 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(209): yii\db\Connection-&gt;quoteValue(&#039;Aktif&#039;)
#5 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(1096): yii\db\Command-&gt;getRawSql()
#6 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(1117): yii\db\Command-&gt;logQuery(&#039;yii\\db\\Command:...&#039;)
#7 /var/www/html/siakad/vendor/yiisoft/yii2/db/Command.php(410): yii\db\Command-&gt;queryInternal(&#039;fetch&#039;, NULL)
#8 /var/www/html/siakad/vendor/yiisoft/yii2/db/Query.php(274): yii\db\Command-&gt;queryOne()
#9 /var/www/html/siakad/vendor/yiisoft/yii2/db/ActiveQuery.php(292): yii\db\Query-&gt;one(NULL)
#10 /var/www/html/siakad/backend/views/layouts/left.php(76): yii\db\ActiveQuery-&gt;one()
#11 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(336): require(&#039;/var/www/html/s...&#039;)
#12 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(254): yii\base\View-&gt;renderPhpFile(&#039;/var/www/html/s...&#039;, Array)
#13 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(156): yii\base\View-&gt;renderFile(&#039;/var/www/html/s...&#039;, Array, NULL)
#14 /var/www/html/siakad/backend/views/layouts/main.php(50): yii\base\View-&gt;render(&#039;left.php&#039;, Array)
#15 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(336): require(&#039;/var/www/html/s...&#039;)
#16 /var/www/html/siakad/vendor/yiisoft/yii2/base/View.php(254): yii\base\View-&gt;renderPhpFile(&#039;/var/www/html/s...&#039;, Array)
#17 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(399): yii\base\View-&gt;renderFile(&#039;/var/www/html/s...&#039;, Array, Object(backend\controllers\SiteController))
#18 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(385): yii\base\Controller-&gt;renderContent(&#039;&lt;section class=...&#039;)
#19 /var/www/html/siakad/vendor/yiisoft/yii2/web/ErrorAction.php(139): yii\base\Controller-&gt;render(&#039;error&#039;, Array)
#20 /var/www/html/siakad/vendor/yiisoft/yii2/web/ErrorAction.php(118): yii\web\ErrorAction-&gt;renderHtmlResponse()
#21 [internal function]: yii\web\ErrorAction-&gt;run()
#22 /var/www/html/siakad/vendor/yiisoft/yii2/base/Action.php(94): call_user_func_array(Array, Array)
#23 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(157): yii\base\Action-&gt;runWithParams(Array)
#24 /var/www/html/siakad/vendor/yiisoft/yii2/base/Module.php(528): yii\base\Controller-&gt;runAction(&#039;error&#039;, Array)
#25 /var/www/html/siakad/vendor/yiisoft/yii2/web/ErrorHandler.php(108): yii\base\Module-&gt;runAction(&#039;site/error&#039;)
#26 /var/www/html/siakad/vendor/yiisoft/yii2/base/ErrorHandler.php(111): yii\web\ErrorHandler-&gt;renderException(Object(yii\web\ForbiddenHttpException))
#27 [internal function]: yii\base\ErrorHandler-&gt;handleException(Object(yii\web\ForbiddenHttpException))
#28 {main}
Additional Information:

Previous exception:
yii\web\ForbiddenHttpException: Login Required in /var/www/html/siakad/vendor/yiisoft/yii2/web/User.php:438
Stack trace:
#0 /var/www/html/siakad/vendor/yiisoft/yii2/filters/AccessControl.php(156): yii\web\User-&gt;loginRequired()
#1 /var/www/html/siakad/vendor/yiisoft/yii2/filters/AccessControl.php(140): yii\filters\AccessControl-&gt;denyAccess(Object(yii\web\User))
#2 /var/www/html/siakad/vendor/yiisoft/yii2/base/ActionFilter.php(77): yii\filters\AccessControl-&gt;beforeAction(Object(yii\base\InlineAction))
#3 [internal function]: yii\base\ActionFilter-&gt;beforeFilter(Object(yii\base\ActionEvent))
#4 /var/www/html/siakad/vendor/yiisoft/yii2/base/Component.php(626): call_user_func(Array, Object(yii\base\ActionEvent))
#5 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(274): yii\base\Component-&gt;trigger(&#039;beforeAction&#039;, Object(yii\base\ActionEvent))
#6 /var/www/html/siakad/vendor/yiisoft/yii2/web/Controller.php(164): yii\base\Controller-&gt;beforeAction(Object(yii\base\InlineAction))
#7 /var/www/html/siakad/backend/controllers/SiteController.php(58): yii\web\Controller-&gt;beforeAction(Object(yii\base\InlineAction))
#8 /var/www/html/siakad/vendor/yiisoft/yii2/base/Controller.php(155): backend\controllers\SiteController-&gt;beforeAction(Object(yii\base\InlineAction))
#9 /var/www/html/siakad/vendor/yiisoft/yii2/base/Module.php(528): yii\base\Controller-&gt;runAction(&#039;&#039;, Array)
#10 /var/www/html/siakad/vendor/yiisoft/yii2/web/Application.php(103): yii\base\Module-&gt;runAction(&#039;&#039;, Array)
#11 /var/www/html/siakad/vendor/yiisoft/yii2/base/Application.php(386): yii\web\Application-&gt;handleRequest(Object(yii\web\Request))
#12 /var/www/html/siakad/backend/web/index.php(17): yii\base\Application-&gt;run()
#13 {main}</pre>
39521 - Backported Security Patch Detection (WWW)
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote HTTP server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/443


Local checks have been enabled.
48204 - Apache HTTP Server Version
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the version number from the banner.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/07/30, Modified: 2018/01/22
Plugin Output

tcp/443


URL : https://siakad.poltekom.ac.id/
Version : 2.4.99
backported : 1
os : ConvertedUbuntu
50845 - OpenSSL Detection
Synopsis
The remote service appears to use OpenSSL to encrypt traffic.
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2010/11/30, Modified: 2013/10/18
Plugin Output

tcp/443

56984 - SSL / TLS Versions Supported
Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/12/01, Modified: 2018/02/15
Plugin Output

tcp/443


This port supports TLSv1.0/TLSv1.1/TLSv1.2.
57041 - SSL Perfect Forward Secrecy Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2011/12/07, Modified: 2017/06/12
Plugin Output

tcp/443


Here is the list of SSL PFS ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-GCM(128) Mac=SHA256
DHE-RSA-AES256-SHA384 Kx=DH Au=RSA Enc=AES-GCM(256) Mac=SHA384
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-GCM(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-GCM(256) Mac=SHA384
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256
DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
70544 - SSL Cipher Block Chaining Cipher Suites Supported
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2013/10/22, Modified: 2013/10/22
Plugin Output

tcp/443


Here is the list of SSL CBC ciphers supported by the remote server :

High Strength Ciphers (>= 112-bit key)

DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA1
DHE-RSA-CAMELLIA128-SHA Kx=DH Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
DHE-RSA-CAMELLIA256-SHA Kx=DH Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
ECDHE-RSA-AES128-SHA Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA1
ECDHE-RSA-AES256-SHA Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA1
CAMELLIA128-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(128) Mac=SHA1
CAMELLIA256-SHA Kx=RSA Au=RSA Enc=Camellia-CBC(256) Mac=SHA1
DHE-RSA-AES128-SHA256 Kx=DH Au=RSA Enc=AES-CBC(128) Mac=SHA256
DHE-RSA-AES256-SHA256 Kx=DH Au=RSA Enc=AES-CBC(256) Mac=SHA256
ECDHE-RSA-AES128-SHA256 Kx=ECDH Au=RSA Enc=AES-CBC(128) Mac=SHA256
ECDHE-RSA-AES256-SHA384 Kx=ECDH Au=RSA Enc=AES-CBC(256) Mac=SHA384
RSA-AES128-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(128) Mac=SHA256
RSA-AES256-SHA256 Kx=RSA Au=RSA Enc=AES-CBC(256) Mac=SHA256

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}
84502 - HSTS Missing From HTTPS Server
Synopsis
The remote web server is not enforcing HSTS.
Description
The remote HTTPS server is not enforcing HTTP Strict Transport Security (HSTS). The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections.
See Also
Solution
Configure the remote web server to use HSTS.
Risk Factor
None
Plugin Information:
Published: 2015/07/02, Modified: 2015/07/02
Plugin Output

tcp/443


The remote HTTPS server does not send the HTTP
"Strict-Transport-Security" header.
84821 - TLS ALPN Supported Protocol Enumeration
Synopsis
The remote host supports the TLS ALPN extension.
Description
The remote host supports the TLS ALPN extension. This plugin enumerates the protocols the extension supports.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2015/07/17, Modified: 2016/02/15
Plugin Output

tcp/443


ALPN Supported Protocols:

http/1.1
94761 - SSL Root Certification Authority Certificate Information
Synopsis
A root Certification Authority certificate was found at the top of the certificate chain.
Description
The remote service uses an SSL certificate chain that contains a self-signed root Certification Authority certificate at the top of the chain.
See Also
Solution
Ensure that use of this root Certification Authority certificate complies with your organization's acceptable use and security policies.
Risk Factor
None
Plugin Information:
Published: 2016/11/14, Modified: 2016/11/14
Plugin Output

tcp/443


The following root Certification Authority certificate was found :

|-Subject : C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
|-Issuer : C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
|-Valid From : May 21 04:00:00 2002 GMT
|-Valid To : May 21 04:00:00 2022 GMT
|-Signature Algorithm : SHA-1 With RSA Encryption
95631 - SSL Certificate Signed Using Weak Hashing Algorithm (Known CA)
Synopsis
A known CA SSL certificate in the certificate chain has been signed using a weak hashing algorithm.
Description
The remote service uses a known CA certificate in the SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g., MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing the attacker to masquerade as the affected service.

Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.
See Also
Solution
Contact the Certificate Authority to have the certificate reissued.
Risk Factor
None
References
BID 11849
BID 33065
CVE CVE-2004-2761
XREF OSVDB:45106
XREF OSVDB:45108
XREF OSVDB:45127
XREF CERT:836068
XREF CWE:310
Plugin Information:
Published: 2016/12/08, Modified: 2018/05/21
Plugin Output

tcp/443


The following known CA certificates were part of the certificate
chain sent by the remote host, but contain hashes that are considered
to be weak.

|-Subject : C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
|-Signature Algorithm : SHA-1 With RSA Encryption
|-Valid From : May 21 04:00:00 2002 GMT
|-Valid To : May 21 04:00:00 2022 GMT
104743 - TLS Version 1.0 Protocol Detection
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.1 and 1.2 are designed against these flaws and should be used whenever possible.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
Solution
Enable support for TLS 1.1 and 1.2, and disable support for TLS 1.0.
Risk Factor
None
Plugin Information:
Published: 2017/11/22, Modified: 2018/04/24
Plugin Output

tcp/443

TLSv1 is enabled and the server supports at least one cipher.

57608 - SMB Signing not required
Synopsis
Signing is not required on the remote SMB server.
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
See Also
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information:
Published: 2012/01/19, Modified: 2018/05/02
Plugin Output

tcp/445

10394 - Microsoft Windows SMB Log In Possible
Synopsis
It was possible to log into the remote host.
Description
The remote host is running a Microsoft Windows operating system or Samba, a CIFS/SMB server for Unix. It was possible to log into it using one of the following accounts :

- NULL session
- Guest account
- Supplied credentials
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/05/09, Modified: 2018/06/06
Plugin Output

tcp/445

- NULL sessions are enabled on the remote host.
10395 - Microsoft Windows SMB Shares Enumeration
Synopsis
It is possible to enumerate remote network shares.
Description
By connecting to the remote host, Nessus was able to enumerate the network share names.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2000/05/09, Modified: 2018/05/16
Plugin Output

tcp/445


Here are the SMB shares available on the remote host :

- print$
- IPC$
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
Synopsis
It was possible to obtain information about the remote operating system.
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2001/10/17, Modified: 2017/11/30
Plugin Output

tcp/445

The remote Operating System is : Windows 6.1
The remote native LAN manager is : Samba 4.3.11-Ubuntu
The remote SMB Domain Name is : SIERRA
10859 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration
Synopsis
It is possible to obtain the host SID for the remote host.
Description
By emulating the call to LsaQueryInformationPolicy(), it was possible to obtain the host SID (Security Identifier).

The host SID can then be used to get the list of local users.
See Also
Solution
You can prevent anonymous lookups of the host SID by setting the 'RestrictAnonymous' registry setting to an appropriate value.

Refer to the 'See also' section for guidance.
Risk Factor
None
References
BID 959
CVE CVE-2000-1200
XREF OSVDB:715
Plugin Information:
Published: 2002/02/13, Modified: 2015/11/18
Plugin Output

tcp/445


The remote host SID value is :

1-5-21-1054010664-971065930-2198881258

The value of 'RestrictAnonymous' setting is : unknown
10860 - SMB Use Host SID to Enumerate Local Users
Synopsis
Nessus was able to enumerate local users.
Description
Using the host security identifier (SID), Nessus was able to enumerate local users on the remote Windows system.
Solution
n/a
Risk Factor
None
References
XREF OSVDB:714
Plugin Information:
Published: 2002/02/13, Modified: 2018/05/16
Plugin Output

tcp/445


- nobody (id 501, Guest account)

Note that, in addition to the Administrator and Guest accounts, Nessus
has enumerated only those local users with IDs between 1000 and 1200.
To use a different range, edit the scan policy and change the 'Start
UID' and/or 'End UID' preferences for this plugin, then re-run the
scan.
11011 - Microsoft Windows SMB Service Detection
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2002/06/05, Modified: 2015/06/02
Plugin Output

tcp/445


A CIFS server is running on this port.
14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

tcp/445

Port 445/tcp was found to be open
17651 - Microsoft Windows SMB : Obtains the Password Policy
Synopsis
It is possible to retrieve the remote host's password policy using the supplied credentials.
Description
Using the supplied credentials it was possible to extract the password policy for the remote Windows host. The password policy must conform to the Informational System Policy.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2005/03/30, Modified: 2015/01/12
Plugin Output

tcp/445

The following password policy is defined on the remote host:

Minimum password len: 5
Password history len: 0
Maximum password age (d): No limit
Password must meet complexity requirements: Disabled
Minimum password age (d): 0
Forced logoff time (s): Not set
Locked account time (s): 1800
Time between failed logon (s): 1800
Number of invalid logon before locked out (s): 0
25240 - Samba Server Detection
Synopsis
An SMB server is running on the remote host.
Description
The remote host is running Samba, a CIFS/SMB server for Linux and Unix.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2007/05/16, Modified: 2013/01/07
Plugin Output

tcp/445

60119 - Microsoft Windows SMB Share Permissions Enumeration
Synopsis
It was possible to enumerate the permissions of remote network shares.
Description
By using the supplied credentials, Nessus was able to enumerate the permissions of network shares. User permissions are enumerated for each network share that has a list of access control entries (ACEs).
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2012/07/25, Modified: 2018/05/16
Plugin Output

tcp/445


Share path : \\SIERRA\print$
Local path : C:\var\lib\samba\printers
Comment : Printer Drivers
[*] Allow ACE for Everyone: 0x001f01ff
FILE_GENERIC_READ: YES
FILE_GENERIC_WRITE: YES
FILE_GENERIC_EXECUTE: YES

Share path : \\SIERRA\IPC$
Local path : C:\tmp
Comment : IPC Service (sierra server (Samba, Ubuntu))
[*] Allow ACE for Everyone: 0x001f01ff
FILE_GENERIC_READ: YES
FILE_GENERIC_WRITE: YES
FILE_GENERIC_EXECUTE: YES
96982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
Synopsis
The remote Windows host supports the SMBv1 protocol.
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
See Also
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
References
XREF OSVDB:151058
Plugin Information:
Published: 2017/02/03, Modified: 2017/02/16
Plugin Output

tcp/445


The remote host supports SMBv1.
100871 - Microsoft Windows SMB Versions Supported (remote check)
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2017/06/19, Modified: 2017/06/19
Plugin Output

tcp/445


The remote host supports the following versions of SMB :
SMBv1
SMBv2
104887 - Samba Version
Synopsis
It was possible to obtain the samba version from the remote operating system.
Description
Nessus was able to obtain the samba version from the remote operating by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2017/11/30, Modified: 2017/11/30
Plugin Output

tcp/445


The remote Samba Version is : Samba 4.3.11-Ubuntu
106716 - Microsoft Windows SMB2 Dialects Supported (remote check)
Synopsis
It was possible to obtain information about the dialects of SMB2 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 dialects running on the remote host by sending an authentication request to port 139 or 445.
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2018/02/09, Modified: 2018/02/09
Plugin Output

tcp/445


The remote host supports the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
3.1.1 Windows 10

14272 - Netstat Portscanner (SSH)
Synopsis
Remote open ports can be enumerated via SSH.
Description
Nessus was able to run 'netstat' on the remote host to enumerate the open ports.

See the section 'plugins options' about configuring this plugin.

Note: This plugin will run on Windows (using netstat.exe) in the event that the target being scanned is localhost.
See Also
Solution
n/a
Risk Factor
None
Plugin Information:
Published: 2004/08/15, Modified: 2018/05/30
Plugin Output

udp/45530

Port 45530/udp was found to be open
Remediations
Suggested Remediations
Taking the following actions across 1 hosts would resolve 95% of the vulnerabilities on the network.
Action to take Vulns Hosts
Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3676-1): Update the affected packages. 70 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : tiff vulnerabilities (USN-3606-1): Update the affected libtiff-tools and / or libtiff5 packages. 36 1
Ubuntu 14.04 LTS / 16.04 LTS : elfutils vulnerabilities (USN-3670-1): Update the affected packages. 9 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : perl vulnerability (USN-3684-1): Update the affected perl package. 7 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : curl vulnerabilities (USN-3648-1): Update the affected packages. 6 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : file vulnerabilities (USN-3686-1): Update the affected file and / or libmagic1 packages. 5 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : procps vulnerabilities (USN-3658-1): Update the affected packages. 5 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : isc-dhcp vulnerabilities (USN-3586-1): Update the affected packages. 4 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : patch vulnerabilities (USN-3624-1): Update the affected patch package. 3 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : git vulnerabilities (USN-3671-1): Update the affected git package. 2 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : gnupg, gnupg2 vulnerabilities (USN-3675-1): Update the affected gnupg and / or gpg packages. 2 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : openssl vulnerability (USN-3628-1): Update the affected libssl1.0.0 package. 2 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : samba vulnerabilities (USN-3595-1): Update the affected samba and / or samba-dsdb-modules packages. 2 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libgcrypt11, libgcrypt20 vulnerability (USN-3689-1): Update the affected libgcrypt11 and / or libgcrypt20 packages. 1 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : icu vulnerability (USN-3610-1): Update the affected libicu52, libicu55 and / or libicu57 packages. 1 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : python-crypto vulnerability (USN-3616-1): Update the affected python-crypto and / or python3-crypto packages. 1 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : sensible-utils vulnerability (USN-3584-1): Update the affected sensible-utils package. 1 1
Ubuntu 16.04 LTS / 17.10 / 18.04 LTS : apport vulnerability (USN-3664-1): Update the affected apport package. 1 1
Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : wget vulnerability (USN-3643-1): Update the affected wget package. 0 1
© 2018 Tenable™, Inc. All rights reserved.