27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ListManager < 9.3b / 9.2c / 8.95d Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4399 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31134<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nThe remote<br />

host is running ListManager, a web-based commercial mailing list management application<br />

from Lyris. According to its banner, the version of ListManager installed on the remote<br />

host relies on client-side code to validate unspecified form parameters before processing<br />

them. An attacker who is subscribed to a list managed by the affected application can<br />

reportedly leverage this issue to elevate his privileges to list administrator or gain access to<br />

arbitrary mailing lists. In addition, once administrative access has been granted, another<br />

vulnerability in ListManager's administrative interface allows creation of new accounts that<br />

collide with existing accounts, which results in overwriting data in the existing accounts.<br />

Solution: Upgrade to version 9.3b / 9.2c / 8.95d or higher.<br />

CVE-2007-6319<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 4400 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed request that was sent to the control bot was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Server Detection<br />

<strong>PVS</strong> ID: 4401 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that is being used to control<br />

a botnet. A botnet is a network of compromised computers that are remotely controlled by a<br />

malicious bot administrator. Botnets are commonly used for\nsending spam\nrunning<br />

Denial of Service (DoS) attacks against other networks\nscanning and compromising new<br />

systems\ninstalling sniffers\ninstalling keyloggers\nidentify theft\nThe observed bot client<br />

request was '%P' and the response from the server was '%L'<br />

realtime<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1148

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!