27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

EMC Retrospect Server Detection<br />

<strong>PVS</strong> ID: 4600 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the EMC Retrospect server. This application is used to<br />

manage data backups of remote Retrospect clients. The major/minor version number<br />

of the Retrospect server is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

DNS Server Source Port 53 Query Usage<br />

<strong>PVS</strong> ID: 4601 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote DNS server is vulnerable to a cache-poisoning attack.\n\nThe<br />

remote host is running a DNS server that is configured to use port 53 as its source port for<br />

queries. This is extremely dangerous as an attacker only needs to spoof a 16-bit transaction<br />

ID in order to poison the DNS cache. A poisoned cache means that DNS clients can be<br />

directed to rogue sites and greatly simplifies phishing attacks.\nIAVA Reference :<br />

2008-A-0045\nSTIG Finding Severity : Category I<br />

Solution: Ensure that the DNS server is fully patched and can utilize a wide range of UDP source<br />

port numbers. For ISC servers, ensure that the following line does not exist within the<br />

configuration file: "query-source address * port 53;"<br />

CVE-2008-1447<br />

OpenDNS Client Detection<br />

<strong>PVS</strong> ID: 4602 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is configured to use OpenDNS DNS servers. OpenDNS is a third-party<br />

DNS provider that offers administrators the ability to filter traffic, view network and user<br />

statistics, and more.<br />

Solution: Ensure that such usage is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Agnitum Outpost Version Detection<br />

<strong>PVS</strong> ID: 4603 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Agnitum Outpost security suite. This suite of tools protects<br />

users from viruses, phishing attacks, malware and more. The observed version was: \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1204

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!