27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

LogMeIn Listening Server Detection<br />

<strong>PVS</strong> ID: 3864 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is actually a LogMeIn server awaiting remote connection.<br />

LogMeIn is an application that allows users to access their computers (work or<br />

home) from anywhere in the world via a web browser. LogMeIn works by installing<br />

an agent on the computer that is to be accessed remotely. The application then<br />

establishes a client connection to an Internet server and awaits the user to connect<br />

over the established HTTPS connection. As such, LogMeIn has the ability to bypass<br />

firewalls and proxies.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Policy - .divx File Detection<br />

<strong>PVS</strong> ID: 3865 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .divx files. These are movie files. As an example,<br />

consider the following file %P\nThe webmaster should make sure that these files are in<br />

compliance with corporate policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

SeaMonkey < 1.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3866 FAMILY: Web Clients RISK: HIGH NESSUS ID:23928<br />

Description: Synopsis :\n\nA web browser on the remote host is prone to multiple flaws.\n\nThe<br />

installed version of SeaMonkey contains various security issues, some of which may lead<br />

to execution of arbitrary code on the affected host subject to the user's privileges.<br />

Solution: Upgrade to version 1.0.7 or higher.<br />

CVE-2006-6505<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mozilla Thunderbird < 1.5.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3867 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:23929<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe remote version of Mozilla Thunderbird suffers from various security<br />

issues, at least one of which may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges.<br />

Family Internet Services 1000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!