27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4593 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the F-PROT Antivirus product version: \n %L \n\nThis version of<br />

F-PROT is vulnerable to a remote Denial of Service (DoS) attack when processing certain<br />

file types. Specifically, malformed CHM, UPX-compressed, ASPack-compressed and<br />

Microsoft Office documents can cause the remote antivirus engine to crash. An attacker<br />

exploiting this flaw would only need the ability to send an email with a malformed<br />

attachment.<br />

Solution: Versions 4.4.4 and 6.0.9.0 are listed as not being vulnerable to this attack.<br />

CVE-2008-3244<br />

HP System Management Version Detection<br />

<strong>PVS</strong> ID: 4594 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running HP System Management version: \n %L \n\nThis application<br />

facilitates remote management via a web interface. The service primarily listens on two<br />

ports: 2301/tcp (plaintext HTTP) and 2381/tcp (SSL).<br />

Solution: Either disable port 2301 or ensure that it forces a redirect to the SSL port (2381).<br />

CVE Not available<br />

HP System Management Homepage (SMH) < 2.1.12 Unspecified XSS<br />

<strong>PVS</strong> ID: 4595 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33548<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host appears to be running HP System Management Homepage (SMH), a<br />

web-based management interface for ProLiant and Integrity servers. The reported version<br />

is: \n %L \n\n.The version of HP SMH installed on the remote host fails to sanitize user<br />

input to an unspecified parameter and script before using it to generate dynamic HTML. A<br />

remote attacker may be able to exploit these issues to cause arbitrary HTML and script<br />

code to be executed by a user's browser in the context of the affected web site.<br />

Solution: Upgrade to version 2.1.12.0 or higher.<br />

CVE-2008-1663<br />

WinRemotePC Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4596 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1202

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!