27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is an SSL/TLS client<br />

Solution: N/A<br />

CVE Not available<br />

Port 80 Non-HTTP Traffic Detection<br />

<strong>PVS</strong> ID: 5978 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running non-HTTP traffic over port 80<br />

realtimeonly<br />

Solution: Ensure that this application is authorized for your network<br />

TeamViewer Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 5979 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TeamViewer, an application for managing machines remotely.<br />

TeamViewer relies on the host computer (usually behind a firewall) initiating an outbound<br />

connection on port 443. Given this, TeamViewer can subvert firewall rules by allowing<br />

direct access to an internal machine from untrusted networks.<br />

Solution: Ensure that this application is authorized for your network<br />

CVE Not available<br />

Yahoo! Messenger Detection<br />

<strong>PVS</strong> ID: 5980 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a Yahoo Instant Messenger client.<br />

Solution: Ensure this software meets corporate guidelines for employee use.<br />

CVE Not available<br />

ISC BIND Response Policy Zones (RPZ) DNAME / CNAME Parsing Remote DoS<br />

<strong>PVS</strong> ID: 5981 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55533<br />

Description: Synopsis : \n\nThe remote DNS server is vulnerable to a denial of service attack.\n\nThe<br />

remote host is running Bind, a popular name server. For your information, the observed<br />

version of Bind is : \n %L \n\nVersions of BIND 9.8 earlier than 9.8.0-P3 are potentially<br />

affected by a denial of service vulnerability. If an attacker sends a specially crafted request<br />

to a BIND server that has recursion enabled and Response Policy Zones (RPZ) configured,<br />

Family Internet Services 1628

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!