27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: If not required, disable the game server.<br />

CVE Not available<br />

Trojan/Backdoor - PhatBOT Detection<br />

<strong>PVS</strong> ID: 1202 FAMILY: Generic RISK: HIGH NESSUS ID:12111<br />

Description: Synopsis :\n\nThe remote host can be remotely controlled by a malicious user\n\nThe<br />

remote systems appears to have PhatBOT installed. This program allows the machine to be<br />

controlled via a P2P network. PhatBOT is extremely sophisticated and allows the remote<br />

attacker to use the victim machine to perform various actions.<br />

Solution: Remove the trojan software from the infected machine and consider re-installing the<br />

operating system.<br />

CVE Not available<br />

Policy - HALO Internet Gaming Client Detection<br />

<strong>PVS</strong> ID: 1203 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is playing the Internet-based action game, HALO.<br />

HALO is a game wherein users from across the Internet can play against each other via<br />

central Internet servers.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Policy - BattleField 1942 Gaming Client Detection<br />

<strong>PVS</strong> ID: 1204 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote client is running a 'BattleField 1942' network game.<br />

Solution: Ensure that this gaming is in alignment with corporate and security policies.<br />

CVE Not available<br />

Apache HTTP Server < 2.0.49 mod_ssl Plain HTTP Request DoS<br />

<strong>PVS</strong> ID: 1205 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12100<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host appears to be running a version of Apache 2.x which is older than 2.0.49.<br />

There is a bug in the mod_ssl module that ships with Apache 2.0.35 to 2.0.48 that makes it<br />

vulnerable to a remote denial of service. An attacker may exploit this flaw by issuing<br />

Family Internet Services 306

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!