27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Trend Micro InterScan VirusWall Version Detection<br />

<strong>PVS</strong> ID: 3892 FAMILY: SMTP Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Trend Micro InterScan VirusWall version %L<br />

Solution: Ensure that you are running the most recent version of VirusWall.<br />

CVE Not available<br />

PGP Desktop < 9.5.1 PGPserv Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 3893 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:24246<br />

Description: Synopsis :\n\nThe remote Windows host has an application that is affected by a privilege<br />

escalation issue.\n\nThe version of PGP Desktop installed on the remote host reportedly<br />

can allow an authenticated remote user to execute arbitrary code on the affected host with<br />

LOCAL SYSTEM privileges. The issue arises because the software operates a service<br />

named 'PGPServ' or 'PGPsdkServ' that exposes a named pipe that fails to validate the object<br />

data passed to it.<br />

Solution: Upgrade to version 9.5.1 or higher.<br />

CVE-2007-0603<br />

Movable Type' Blog < 3.34 XSS<br />

<strong>PVS</strong> ID: 3894 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Movable Type, a blogging software for Unix and Windows<br />

platforms. This version of Movable Type is vulnerable to a persistent Cross-Site Scripting<br />

(XSS) flaw. An attacker exploiting this flaw would post malicious code into the blog.<br />

Successful exploitation would allow an attacker to execute malicious code within a user's<br />

browser or disclose confidential data.<br />

Solution: Upgrade to version 3.34 or higher.<br />

CVE Not available<br />

Stompy (the session stomper) Vulnerability Scanner Detection<br />

<strong>PVS</strong> ID: 3895 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is scanning with the Stompy HTTP session scanner. This tool scans web<br />

servers and detects applications that use predictable 'Session Identifier' algorithms.<br />

Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1008

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!