27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running WinRemotePC, a software application that allows for remote<br />

desktop administration of the machine.<br />

Solution: Ensure that such a solution is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

RunCMS < 1.6.2 Multiple Script Remote File Inclusion<br />

<strong>PVS</strong> ID: 4597 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running RunCMS, a web-based content management and messaging system. This version<br />

of RunCMS is reported to be vulnerable to a number of remote file inclusion<br />

vulnerabilities. Specifically, the 'votepolls.php' and 'config.php' scripts can be tricked into<br />

opening and running scripts from a malicious webserver. An attacker exploiting these flaws<br />

would only need the ability to send requests to the application. Successful exploitation<br />

would result in the attacker executing arbitrary script code on the server.<br />

Solution: Upgrade to version 1.6.2 or higher.<br />

CVE-2008-3354<br />

OpenSSH X11 < 5.1 Session Hijacking<br />

<strong>PVS</strong> ID: 4598 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local 'session hijacking'<br />

flaw.\n\nAccording to its banner, the version of SSH installed on the remote host is older<br />

than 5.1. Such versions may allow a local user to hijack X11 sessions because it improperly<br />

checks user privileges before re-binding a port. In order for the attack to be successful, the<br />

'X11UseLocalhost' option would need to be disabled. By default, the option is enabled.<br />

Further, the OpenSSH service would need to be running on an operating system (such as<br />

HP-UX) where the effective user ID is not checked.<br />

Solution: Upgrade to version 5.1 or higher.<br />

CVE-2008-3259<br />

EMC Retrospect Backup Client Version Detection<br />

<strong>PVS</strong> ID: 4599 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the EMC Retrospect backup client. This host allows a<br />

server to connect and access data remotely. This application listens on port 497/tcp<br />

for connections. The reported version number is: \n %L<br />

Solution: Ensure that only valid IP addresses can access the service.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1203

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!