27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote server is forwarding email in a manner consistent with many SPAM/UCE<br />

servers. A portion of the sent email includes: \n %L<br />

Solution: Ensure that this email server is authorized to send SPAM/UCE emails.<br />

CVE Not available<br />

Microsoft .NET Framework Version Detection<br />

<strong>PVS</strong> ID: 4128 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft .NET Framework version %L<br />

Solution: Ensure that you are running the latest version of .NET Framework.<br />

CVE Not available<br />

Microsoft ASP.NET Version Detection<br />

<strong>PVS</strong> ID: 4129 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Microsoft ASP.NET version %L<br />

Solution: Ensure that you are running the latest version of ASP.NET.<br />

CVE Not available<br />

ClamAV < 0.91.0 Multiple RAR Content Parsing Vulnerabilities<br />

<strong>PVS</strong> ID: 4130 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the ClamAV antivirus client version %L\n\nThis version of ClamAV is<br />

vulnerable to a denial of service (DoS) attack when handling malformed RAR archive files.<br />

An attacker exploiting this flaw would only need the ability to send an email to the<br />

vulnerable system. Successful exploitation would result in the application crashing. Further,<br />

it has been alleged that it may be possible to execute arbitrary code on the remote machine.<br />

Solution: Upgrade to version 0.91.0 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

AVG AntiVirus < 7.5.476 avg7core.sys Local Privilege Escalation<br />

<strong>PVS</strong> ID: 4131 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local privilege escalation flaw.\n\nThe<br />

remote host is running AVG Antivirus. This version of AVG is reported to be prone to a<br />

flaw where a local attacker can escalate privileges and gain administrative access to the<br />

application or system. An attacker exploiting this flaw would need to be locally<br />

authenticated. Successful exploitation would result in the attacker gaining SYSTEM access.<br />

Family Internet Services 1072

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!