27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is vulnerable to a privilege escalation attack.\n\nThe remote<br />

host is running Sun Java System Identity Manager 8.1 with Patch 5 or 6. Such versions are<br />

potentially affected by a privileges escalation vulnerability when it is configured with Sun<br />

Java System Access Manager, OpenSSO Enterprise 8.0, or IBM Tivoli Access Manager.<br />

An attacker, exploiting this flaw, could gain administrative privileges on the affected<br />

application. For your information, the observed version of Sun Java System Identity<br />

Manager is: \n %L<br />

Solution: Apply Patch 7 from the Sun reference.<br />

CVE-2010-0311<br />

phpMyAdmin < 2.11.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5304 FAMILY: CGI RISK: HIGH NESSUS ID:44324<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is running a version of phpMyAdmin<br />

earlier than 2.11.10. Such versions are potentially affected by multiple vulnerabilities : \n\n<br />

- A cross-site request forgery attack because the application uses the 'unserialize()' PHP<br />

function on potentially unsafe data in the setup script.(CVE-2009-4605)\n\n - An insecure<br />

file creation and deletion vulnerability due to the way phpMyAdmin creates temporary<br />

files.\n\nFor your information, the observed version of phpMyAdmin is: \n %L<br />

Solution: Upgrade to phpMyAdmin 2.11.10, 3.0.0, or later.<br />

CVE-2009-4605<br />

Windows-Vista VPN Detection<br />

<strong>PVS</strong> ID: 5305 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Windows-Vista VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they<br />

were local users. A VPN which allows split-tunneling will essentially serve as a<br />

bridge between the remote network and the internal network. Special care should<br />

be taken to ensure that remote VPN clients connect securely and do not introduce<br />

an unacceptable level of Risk to the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to Corporate Guidelines and Policies.<br />

CVE Not available<br />

Dead Peer Detection v1.0 VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5306 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Dead Peer Detection v1.0 VPN Server. A VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an internal network as if they were<br />

local users. A VPN which allows split-tunneling will essentially serve as a bridge between<br />

the remote network and the internal network. Special care should be taken to ensure that<br />

Family Internet Services 1418

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!