27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

E-mail Client Detection<br />

<strong>PVS</strong> ID: 1100 FAMILY: SMTP Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running the following e-mail client: %L<br />

Solution: N/A<br />

CVE Not available<br />

UoW imapd (UW-IMAP) AUTHENTICATE Command Remote Overflow<br />

<strong>PVS</strong> ID: 1101 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:10292<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote UW-IMAP<br />

server has a buffer overflow bug when it processes the argument of the AUTHENTICATE<br />

command. An attacker may exploit this flaw to gain a root shell on this host<br />

Solution: Upgrade uw-imap to its latest version.<br />

CVE-1999-0005<br />

WinRoute Proxy Detection<br />

<strong>PVS</strong> ID: 1102 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote proxy may pass local user credentials to a malicious external<br />

website\n\nThe remote client is utilizing a WinRoute Proxy. Some versions of this proxy<br />

have a bug wherein client Proxy authorization is forwarded to remote web servers. As a<br />

result, a malicious web server can retrieve the user's Proxy UserID and password. Versions<br />

of Winroute up to 5.1.4 are affected by this vulnerability.<br />

Solution: Upgrade to 5.1.4 or later.<br />

CVE Not available<br />

Weak SSL Ciphers Supported<br />

<strong>PVS</strong> ID: 1103 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10863<br />

Description: Synopsis :\n\nThe remote SSL server is configured to use weak encryption\n\nThe SSL<br />

server allows clients to connect using weak (export grade) Ciphers. As these ciphers are<br />

more easily cracked or hijacked, there is the potential of a remote session being taken over<br />

or observed. There is a risk of potential loss of confidential data.<br />

Solution: Disable weak ciphers on the TLS/SSL server.<br />

CVE Not available<br />

Weak SSL Ciphers Supported<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 281

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!