27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials\n\nThe remote SQL server allows logins with the 'admin' password set to<br />

'password'<br />

Solution: Require the SQL server to utilize an encrypted login and ensure that passwords are not<br />

trivially guessed.<br />

CVE Not available<br />

Web Server SSLv3 Detection<br />

<strong>PVS</strong> ID: 1133 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The web server on this port is tunneling traffic through SSL version 3.<br />

Solution: N/A<br />

CVE Not available<br />

Web Server SSLv2 Detection<br />

<strong>PVS</strong> ID: 1134 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The server on this port is tunneling traffic through SSL version 2.<br />

Solution: N/A<br />

CVE Not available<br />

Web Server SSLv1 Detection<br />

<strong>PVS</strong> ID: 1135 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

Description: The server on this port is tunneling traffic through SSL version 1.<br />

Solution: Disable SSLv1 in favor of stronger encryption such as TLSv1 or SSLv3.<br />

CVE Not available<br />

lftp HTTP Directory Name Handling Remote Overflow<br />

NESSUS ID:Not Available<br />

<strong>PVS</strong> ID: 1136 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe client is using a<br />

version of lftp less than 2.6.10. This version is vulnerable to a remote buffer overflow from<br />

a malicious server.<br />

Solution: Upgrade to version 2.6.10 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 289

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!