27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2003-0963<br />

Symantec Antivirus LiveUpdate Local Privilege Escalation<br />

<strong>PVS</strong> ID: 1137 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an instance of Symantec Anti-virus. The host is also<br />

configured to automatically update virus signatures via LiveUPDATE. Depending<br />

on the version, this may allow a local user to gain elevated privileges.<br />

Solution: Larger companies will wish to distribute virus pattern files via a central, internal<br />

update site. For large companies, individual users accessing Internet updates will tend<br />

to decrease bandwidth and cause undue congestion on the network.<br />

CVE-2003-0994<br />

Policy - SETI@HOME Client Detection<br />

<strong>PVS</strong> ID: 1138 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable.\n\nThe remote client is running the SETI@HOME application which is used<br />

to maximize spare CPU cycles within a workstation in order to Search for Extra Terrestrial<br />

Intelligence. While it does not usually interfere with operations on the local machine, it has<br />

the possibility of taking up bandwidth while downloading work updates.<br />

Solution: Ensure that the application is allowed within your environment.<br />

CVE Not available<br />

SHOUTcast Media Server Detection<br />

<strong>PVS</strong> ID: 1139 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running the SHOUTcast media server: %L<br />

Solution: Ensure that this instance of SHOUTcast meets corporate and security guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Elm frm Command Mail Subject Line Handling Remote Overflow<br />

<strong>PVS</strong> ID: 1140 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host is<br />

running Elm 2.5.6 or older, which contains a buffer overflow which might be triggered<br />

remotely. To exploit it, an attacker would need to send a malicious email to a user of this<br />

hosts.<br />

Solution: Upgrade to the latest version of Elm (available at http://www.instinct.org/elm).<br />

Family Internet Services 290

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!