27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TrendMicro Interscan Web <strong>Security</strong> Suite (IWSS) Default Password<br />

<strong>PVS</strong> ID: 4928 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a TrendMicro Interscan Web <strong>Security</strong> Suite<br />

server with the default login and password set ('admin/adminIWSS85').\nThe affected web<br />

application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

IBM WebSphere Application Server 6.1 < Fix Pack 21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4929 FAMILY: Web Servers RISK: HIGH NESSUS ID:35659<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 6.1 before Fix Pack 21 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple flaws :\n\n - Provided Performance Monitoring<br />

Infrastructure (PMI) is\n enabled. It may be possible for a local attacker to\n obtain<br />

sensitive information through 'Systemout.log' and\n 'ffdc' files which are written by<br />

PerfServlet.\n - SSL Configuration settings attribute '<strong>Security</strong> Level' \n does not correctly<br />

enforce the level of encryption used\n by the application server. (PK63182)<br />

Solution: Apply Fix Pack 21 (6.1.0.21) or higher.<br />

CVE-2009-0434<br />

ProFTPD Username Variable Substitution SQL Injection<br />

<strong>PVS</strong> ID: 4930 FAMILY: FTP Servers RISK: HIGH NESSUS ID:35690<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is using ProFTPD, a free FTP server for Unix and Linux. The version of ProFTPD running<br />

on the remote host allows the percent character, '%', within the username. This would allow<br />

attackers to inject special SQL characters such as a single quote. An attacker exploiting this<br />

flaw would be able to execute arbitrary SQL commands against the database server. The<br />

reported version of ProFTPD is: \n %L \n<br />

Solution: Upgrade to version 1.3.2rc3 or higher.<br />

CVE-2009-0542<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Media Gateway Control Protocol (MGCP) Server Detection<br />

<strong>PVS</strong> ID: 4931 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Media Gateway Control Protocol (MGCP) server. An MGCP server is<br />

used to create and manage media sessions between multiple clients over multiple protocols.<br />

In particular, it is commonly used with Voice-Over-IP (VoIP) services.<br />

Family Internet Services 1301

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!