27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote mail server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running Kerio MailServer, a commercial mail server available for Windows, Linux<br />

and Mac OS X platforms. According to its banner, the installed version of Kerio<br />

MailServer is affected by several issues :\n\n - There is a possible buffer overflow in the<br />

Visnetic antivirus plugin.\n\n - There is an unspecified security issue with NULL DACL in<br />

the AVG plugin.\n\n - Memory corruption is possible during uudecode decoding.<br />

Solution: Upgrade to version 6.5.0 or higher.<br />

CVE-2008-0860<br />

SHOUTcast Server Service Port Default Password<br />

<strong>PVS</strong> ID: 4382 FAMILY: Generic RISK: HIGH NESSUS ID:31098<br />

Description: Synopsis :\n\nThe remote service is protected with default credentials.\n\nThe remote<br />

SHOUTcast Server's service port is configured to use the default password to allow<br />

broadcasting content and administration. Knowing it, an attacker can gain administrative<br />

control of the affected application.<br />

Solution: Edit the application's 'sc_serv.ini' file and change the 'Password' setting. Then, restart the<br />

service to put the change into effect.<br />

CVE Not available<br />

BEA WebLogic Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4383 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BEA WebLogic Server that is vulnerable to a number of distinct<br />

flaws. An attacker exploiting these flaws would be able to impact availability,<br />

confidentiality and integrity. The vendor has released new versions of the WebLogic<br />

software that address these issues.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Now SMS/MMS Gateway Version Detection<br />

<strong>PVS</strong> ID: 4384 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Now SMS/MMS Gateway, a commercial product for<br />

managing SMS/MMS messaging on a network. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1143

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!