27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: No solution is known at this time.<br />

AFP Server Detection<br />

CVE-2008-7142<br />

<strong>PVS</strong> ID: 4437 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an AFP Server. Apple Filing Protocol (AFP) is a service that allows<br />

network-based file sharing between machines. The server supports AFP version %P.<br />

Solution: Ensure that this file server is authorized and configured correctly.<br />

AFP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4438 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an AFP Server. Apple Filing Protocol (AFP) is a service that allows<br />

network-based file sharing between machines. The server supports AFP protocol<br />

versions\n%L.<br />

Solution: Ensure that this file server is authorized and configured correctly.<br />

AFP Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4439 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an AFP Client. Apple Filing Protocol (AFP) is a service that allows<br />

network-based file sharing between machines. The client is using AFP protocol version %L<br />

Solution: N/A<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4440 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot Administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\ninstalling sniffers\ninstalling<br />

keyloggers\nidentify theft \n\nThe observed request that was sent to the control bot was<br />

'%P' and the observed response from the infected botnet client was '%L'<br />

Family Internet Services 1158

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!