27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running Apache web server on Novell NetWare.<br />

Solution: N/A<br />

CVE Not available<br />

eEye Retina Scanner Detection<br />

<strong>PVS</strong> ID: 1158 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is running an instance of eEye Retina vulnerability<br />

scanner.<br />

Solution: Ensure that the owner of this machine is scanning within corporate policy.<br />

CVE Not available<br />

Nessus Scanner Detection<br />

<strong>PVS</strong> ID: 1159 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is running the Nessus vulnerability scanner.<br />

Solution: Ensure that the scanner is being used in a responsible and authorized manner.<br />

CVE Not available<br />

Sami HTTP Server 1.0.4 GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 1160 FAMILY: Web Servers RISK: HIGH NESSUS ID:12073<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host seems<br />

to be running Sami HTTP Server v1.0.4 or older. A vulnerability has been reported for<br />

Sami HTTP server v1.0.4. An attacker may be capable of corrupting data such as return<br />

address, and thereby control the execution flow of the program. This may result in denial of<br />

service or execution of arbitrary code.<br />

Solution: Use another web server since Sami HTTP is not maintained any more.<br />

CVE-2004-0292<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Jigsaw < 2.2.4 URI Parsing Remote Code Execution<br />

<strong>PVS</strong> ID: 1161 FAMILY: Web Servers RISK: HIGH NESSUS ID:12071<br />

Family Internet Services 295

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!