27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4225 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote server requires authentication for certain resources. Specifically,<br />

the resource "%P" requires user authentication. However, the server does not require a<br />

strong encryption of the passed credentials. Specifically, the server allows clients to send<br />

credentials using HTTP Basic authentication. The client credentials are passed in plaintext<br />

and slightly obfuscated by using base64 encoding. Such encoding is trivial and a passive<br />

attacker with the ability to sniff the traffic can easily gain access to a user's credentials.<br />

Solution: Use SSL or a stronger authentication mechanism.<br />

CVE Not available<br />

Firebird Database Plaintext Password<br />

<strong>PVS</strong> ID: 4226 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host appears to be running a Firebird database client. This instance<br />

of the Firebird client allows the passing of confidential data over an unencrypted session.<br />

Given this, an attacker can sniff confidential data such as database name, user ID, or<br />

credentials to gain elevated access to the database. The sniffed account was \n%L<br />

Solution: Require remote clients to use an encrypted session.<br />

CVE Not available<br />

Firebird Database Plaintext Password<br />

<strong>PVS</strong> ID: 4227 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host seems to be running a Firebird database server. This instance<br />

of the Firebird server allows the passing of confidential data over an unencrypted session.<br />

An attacker can sniff confidential data such as database name, user ID and credentials to<br />

gain elevated access to the database. The sniffed account was \n%P<br />

Solution: Require remote clients to use an encrypted session.<br />

CVE Not available<br />

Firebird Database Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4228 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1099

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!