27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Finjan SurfinGate Proxy FHTTP Command Admin Functions Authentication Bypass<br />

<strong>PVS</strong> ID: 1169 FAMILY: Web Servers RISK: HIGH NESSUS ID:12036<br />

Description: Synopsis :\n\nThe remote proxy can be tricked into executing commands\n\nThe remote<br />

host is running a Finjan proxy. It may be possible to use this proxy and force it to connect<br />

to itself, to then issue administrative commands to this service. An attacker may use this<br />

flaw to force this proxy to restart continuously, although other administrative commands<br />

might be executable.<br />

Solution: Block all connections to '*:ControlPort'<br />

CVE-2004-2107<br />

PPTP Set-Link-Info - Setup of PPTP VPN Channel Detection<br />

<strong>PVS</strong> ID: 1170 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host has created a PPTP VPN connection. You should ensure<br />

that this sort of connection is authorized within existing Company guidelines or policies.<br />

Solution: Block port 1723 and ensure this connection is authorized.<br />

CVE Not available<br />

HTTP Based ZIP File Download Detection<br />

<strong>PVS</strong> ID: 1171 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: An HTTP transfer of a file compressed with the ZIP algorithm was just observed. This file<br />

may contain malicious code, or content that may not be subjected to any content filtering in<br />

place. However, if the host attempting the download is a web server, email server or other<br />

server, this behavior may be indicative of a system compromise.<br />

Solution: Block all HTTP requests with content type: application/zip, and ensure a content filtering<br />

system is in place that handles ZIP compressed files.<br />

CVE Not available<br />

LDAP Server NULL Bind Detection<br />

<strong>PVS</strong> ID: 1172 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10723<br />

Description: Synopsis :\n\nThe remote LDAP server allows NULL connections\n\nThe remote server is<br />

an LDAP server. Further, it appears as if the server allows NULL BIND requests. If this is<br />

an internal server, then this is considered an acceptable configuration.<br />

Solution: Ensure that this server is authorized with respect to Corporate standards and policies.<br />

Family Internet Services 298

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!