27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4480 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

CVE Not available<br />

Trojan Horse Client Detection<br />

<strong>PVS</strong> ID: 4481 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote client appears to be infected by a Trojan horse. <strong>PVS</strong> had<br />

determined this based on the outbound connections recently made to control servers.<br />

Solution: Manually check system integrity and remove any malicious code or processes that may<br />

reside on the system.<br />

WordPress <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4482 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe version of WordPress installed on the remote host is<br />

vulnerable to a directory traversal attack. An attacker exploiting this flaw would send<br />

malformed data to the 'cat' parameter of the 'index.php' script. Successful<br />

exploitation would result in the attacker gaining access to confidential files on the<br />

target server. The path to the vulnerable version of WordPress is:\n%P<br />

Solution: Upgrade to a version higher than 2.3.3.<br />

eTrust Proxy Detection<br />

CVE-2008-4769<br />

<strong>PVS</strong> ID: 4483 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the eTrust Secure Content Manager proxy.<br />

Solution: N/A<br />

CVE Not available<br />

CA eTrust SCM Plaintext Login Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1170

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!