27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NTP Server Protocol Version 2 Detection<br />

<strong>PVS</strong> ID: 1149 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a <strong>Network</strong> Time Protocol (NTP) protocol version 2 server<br />

service (Stratum 2) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines.<br />

CVE Not available<br />

NTP Server Protocol Version 1 Detection<br />

<strong>PVS</strong> ID: 1150 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a <strong>Network</strong> Time Protocol (NTP) protocol version 1 server<br />

service (Stratum 1) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines.<br />

CVE Not available<br />

NTP Server Protocol Version 2 Detection<br />

<strong>PVS</strong> ID: 1151 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote server is running a <strong>Network</strong> Time Protocol (NTP) protocol version 2 server<br />

service (Stratum 1) which is used to synchronize time amongst multiple machines.<br />

Solution: Ensure that this server is authorized and running in compliance with Corporate standards<br />

and <strong>Security</strong> guidelines.<br />

CVE Not available<br />

smallftpd Crafted RETR Command Remote Overflow DoS<br />

<strong>PVS</strong> ID: 1152 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12072<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote FTP server (smallftpd) is vulnerable to a flaw that may allow a remote user to crash<br />

the server if the user specifies an overly long RETR command. Note that the remote user<br />

must have a valid username and password to exploit this flaw.<br />

Solution: Restrict access to trusted users.<br />

CVE-2004-0299<br />

Windows RDP / Terminal Services Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 293

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!