27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2004-0341<br />

Zebra Routing Software Detection<br />

<strong>PVS</strong> ID: 1177 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the open source Zebra routing daemon. This daemon is<br />

capable of routing RIP, OSPF, and BGP traffic.<br />

Solution: Ensure that this software is running within the boundaries of existing corporate and security<br />

policies.<br />

CVE Not available<br />

GHOST UDP <strong>Network</strong> Client Detection<br />

<strong>PVS</strong> ID: 1178 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a GHOST client which looks for a GHOST server and, if found,<br />

downloads a bootable image at system startup.<br />

Solution: Ensure that this protocol is secured and within corporate and security policies and<br />

guidelines. This traffic should never be seen on an external (DMZ or Extranet) segment.<br />

CVS Software Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1179 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote client is using CVS to synchronize files.<br />

Solution: Ensure that the client is operating under the guidelines as set forth by corporate and security<br />

policies. Further, examine the possibility of securing the CVS session by using CVS over<br />

SSH.<br />

CVE Not available<br />

CVS < 1.11.10 / 1.12.3 pserver Crafted Module Request Arbitrary File / Directory Creation<br />

<strong>PVS</strong> ID: 1180 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11947<br />

Description: Synopsis :\n\nThe remote host allows unauthorized users to create or modify<br />

files/directories\n\nThe remote CVS server, according to its version number, may allow an<br />

attacker to create directories and possibly files at the root of the filesystem holding the CVS<br />

repository.<br />

Solution: Upgrade CVS to 1.11.10, 1.12.3 or later.<br />

CVE-2003-0977<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 300

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!