27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Plain Old Webserver (POW), a Firefox plugin that allows the user to run a<br />

web server via a browser plugin. This version of POW is vulnerable to a directory traversal<br />

flaw. An attacker exploiting this flaw would send a malformed request that contained '../'<br />

strings. Such a request would allow the attacker to obtain confidential files from outside the<br />

web root directory. Successful exploitation would lead to the loss of confidential data.<br />

Solution: Upgrade to version 0.0.9 or higher.<br />

CVE-2007-0872<br />

Mercury LoadRunner Detection<br />

<strong>PVS</strong> ID: 3911 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Mercury's LoadRunner. This tool is used to manage and test<br />

network applications. In the past, LoadRunner has been vulnerable to remote attacks. The<br />

following information was culled from the Agent:\n\n%L<br />

Solution: Ensure that you are running the latest version of LoadRunner and consider using ACLs to<br />

ensure that untrusted hosts cannot connect to the LoadRunner application.<br />

CVE Not available<br />

Cisco VPN Server Detection (PPTP)<br />

<strong>PVS</strong> ID: 3912 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote Cisco server is acting as a PPTP VPN server.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco VPN Concentrator Administrative Interface Detection<br />

<strong>PVS</strong> ID: 3913 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote Cisco server is acting as a PPTP VPN server. Further, the server<br />

has enabled web administration over unencrypted HTTP. The VPN Concentrator handles<br />

user accounts and other confidential data. An attacker with the ability to sniff the network<br />

would be able to gather confidential data that would be useful in future attacks. The<br />

reported machine name is:\n\n%L<br />

Solution: Use Access Control Lists (ACLs) to block access from untrusted machines. In addition,<br />

force the communication over an SSL connection.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!