27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

SMTP Server Inbound .exe Attachment Detection<br />

<strong>PVS</strong> ID: 1173 FAMILY: SMTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> has noted an inbound mail message that contained a .exe attachment. CAVEAT: <strong>PVS</strong><br />

was not able to determine whether or not the SMTP server actually processed the email<br />

message.<br />

Solution: If applicable, block incoming .exe attachments. Ensure antivirus and malware<br />

detection is deployed.<br />

TFTP Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1174 FAMILY: FTP Servers RISK: NONE NESSUS ID:11819<br />

Description: The remote host is running a TFTPD server. This server allows for unauthenticated file<br />

transfer to and from the host.<br />

Solution: If you do not require this TFTP service, disable it.<br />

CVE Not available<br />

TYPSoft FTP Server < 1.11 Invalid Path Request DoS<br />

<strong>PVS</strong> ID: 1175 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12075<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host seems to be running TYPSoft FTP 1.10 or earlier. TYPESoft FTP Server is<br />

prone to a remote denial of service vulnerability that may allow an attacker to cause the<br />

server to crash.<br />

Solution: Upgrade to version 1.11 or later.<br />

CVE-2004-0325<br />

Windows NT FTP Server (WFTP) Pro Server < 3.21 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1176 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12083<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple issues\n\nThe remote server is<br />

running a potentially vulnerable version of WFTPD. There are at least one remote<br />

stack-based buffer overflows and two remote Denial of Service (DoS) attacks that WFTPD<br />

is vulnerable to.<br />

Solution: Upgrade to WFTP 3.21 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 299

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!