27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the IBM Tivoli Storage Manager version: \n %L \n\nThis version of TSM is<br />

reported vulnerable to a remote buffer overflow. An attacker exploiting this flaw would be<br />

able to execute arbitrary code on the remote system.<br />

Solution: Upgrade to version 5.4.4.1 or higher.<br />

CVE-2008-4563<br />

WebSphere '.ear' File Detection<br />

<strong>PVS</strong> ID: 4960 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .ear files. .ear files are compressed source code containers<br />

that contain all of the source code and resource files for a particular web application. An<br />

attacker gaining access to this file can use any common decompression software and gain<br />

access to the source code and resource files. This can lead to the loss of confidential data<br />

and possibly more sophisticated future attacks. The '.ear' file is located at '%P'<br />

Solution: N/A<br />

CVE Not available<br />

WebSphere '.war' File Detection<br />

<strong>PVS</strong> ID: 4961 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .war files. .war files are compressed source code<br />

containers that contain all of the source code and resource files for a particular web<br />

application. An attacker gaining access to this file can use any common decompression<br />

software and gain access to the source code and resource files. This can lead to the loss of<br />

confidential data and possibly more sophisticated future attacks. The '.war' file is located at<br />

'%P'<br />

Solution: N/A<br />

CVE Not available<br />

Cisco Phone Client Detection (SCCP)<br />

<strong>PVS</strong> ID: 4962 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client uses the Skinny protocol.\n\nThe remote client is a phone<br />

that understands the Skinny protocol, also known as SCCP, for 'Skinny Client Control<br />

Protocol'. Skinny is Cisco's proprietary lightweight terminal control protocol used by some<br />

VoIP phones to communicate with Cisco CallManager or Asterisk PBX systems.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1310

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!