27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5935 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Terminal Services or Remote Desktop Protocol (RDP). This<br />

protocol is used to manage remote servers and is installed, by default, on Windows XP<br />

Systems. An attacker can use this port to brute force the user accounts present on the<br />

server.<br />

realtimeonly<br />

Solution: Ensure that RDP is required for the machine in question.<br />

CVE Not available<br />

<strong>PVS</strong>-SSH-Server-Session_Start<br />

<strong>PVS</strong> ID: 5936 FAMILY: SSH RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a SSH server : \n %L<br />

Solution: N/A<br />

realtimeonly<br />

<strong>PVS</strong>-SSH-Session_Start<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5937 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host client just initiated a SSH session<br />

Solution: N/A<br />

SSL Client Detection<br />

realtimeonly<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5938 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an SSL/TLS client<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk SIP Channel Driver Denial of Service (AST-2011-007)<br />

Family Internet Services 1615

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!