27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Policy - iroffer Software Detection<br />

<strong>PVS</strong> ID: 1185 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote system appears to have iroffer. This program allows the<br />

machine to be used as an IRC fileserver. Iroffer and such bots are most common in warez<br />

and illegal file transfer agents.<br />

Solution: Locate and eliminate the application serving this traffic.<br />

CVE Not available<br />

Policy - Time of Defiance Gaming Client Detection<br />

<strong>PVS</strong> ID: 1186 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is playing the Internet-based 'Time of Defiance' <strong>Network</strong><br />

strategy game.<br />

Solution: Ensure that this sort of gaming is in alignment with corporate and security standards.<br />

CVE Not available<br />

Policy - BattleField 1942 <strong>Network</strong> Gaming Server Detection<br />

<strong>PVS</strong> ID: 1187 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote Server is hosting a 'BattleField 1942' <strong>Network</strong> Game Server.<br />

Solution: Ensure that this gaming server is in alignment with corporate and security policies.<br />

CVE Not available<br />

Mutt < 1.4.2 menu.c menu_pad_string Function Index Menu Code Remote Overflow DoS<br />

<strong>PVS</strong> ID: 1188 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nMutt 1.4.1 and older<br />

versions are vulnerable to a buffer overflow vulnerabilty in the code which is used to draw<br />

menus on screen. An attacker could exploit this flaw to prevent a user from reading his mail<br />

using this client (thus corrupting a full mailbox), or possibly to execute code remotely.<br />

Solution: Upgrade to Mutt 1.4.2 or later.<br />

CVE-2004-0078<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Policy - Command and Conquer Gaming Server Detection<br />

Family Internet Services 302

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!