27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote host<br />

appears to be running a version of the Jigsaw web server which is older than 2.2.4. This<br />

version is vulnerable to a bug in the way it parses URI. An attacker might exploit this flaw<br />

to execute arbitrary code on this host.<br />

Solution: Upgrade to version 2.2.4 or later.<br />

CVE-2004-2274<br />

Kerberos Version 5 Server Detection<br />

<strong>PVS</strong> ID: 1162 FAMILY: Generic RISK: HIGH NESSUS ID:11512<br />

Description: The remote host is running Kerberos 5. There are several vulnerabilities associated with<br />

this software.<br />

Solution: Ensure that this instance of Kerberos is in keeping with corporate standards and security<br />

guidelines.<br />

CVE-2003-0139<br />

MIT Kerberos 4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1163 FAMILY: Generic RISK: HIGH NESSUS ID:11511<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote host is running Kerberos 4. It has been demonstrated that the<br />

Kerberos 4 protocol has inherent design flaws that make it insecure to use.<br />

Solution: Upgrade to Kerberos 5. If you run Kerberos 5 with Kerberos 4 backward compatibility,<br />

make sure you upgrade to version 1.3.<br />

CVE-2003-0139<br />

Kerberos Version 5 Server Detection<br />

<strong>PVS</strong> ID: 1164 FAMILY: Generic RISK: HIGH NESSUS ID:11512<br />

Description: The remote host is running Kerberos 5. Kerberos 5 contains multiple vulnerabilities<br />

depending on the version and configuration.<br />

Solution: Ensure that this instance of Kerberos is in keeping with Corporate standards and<br />

<strong>Security</strong> guidelines. Upgrade to the latest version if required.<br />

CVE-2002-0036<br />

SAMI FTP Server Multiple DoS<br />

<strong>PVS</strong> ID: 1165 FAMILY: FTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12061<br />

Family Internet Services 296

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!