27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

malformed SSL commands when connecting to the remote host, and may therefore use it to<br />

prevent HTTPS from working.<br />

Solution: Upgrade to Apache/2.0.49 or later.<br />

CVE-2004-0113<br />

Courier < 0.45 Japanese Codeset Conversion Overflows<br />

<strong>PVS</strong> ID: 1206 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:12102<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote mail server<br />

is the Courier MTA. There is a buffer overflow in the Japanese codeset conversion<br />

functions of this software that may allow an attacker to execute arbitrary code on this host.<br />

Solution: Upgrade to Courier 0.45 or later.<br />

CVE-2004-0224<br />

Trojan/Backdoor - Agobot.FO Detection<br />

<strong>PVS</strong> ID: 1207 FAMILY: Backdoors RISK: HIGH NESSUS ID:12128<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote host has the<br />

Agobot.FO backdoor installed. This backdoor is known to scan local networks for<br />

common Microsoft vulnerabilities, scan local networks for exploitable DameWare<br />

systems, brute force local Microsoft machine User accounts, connect to an IRC<br />

channel and setup a BOT for remote command execution.<br />

Solution: This backdoor should be immediately removed from the infected systems and<br />

manually cleaned.<br />

CVE Not available<br />

WU-FTPD < 2.6.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1208 FAMILY: FTP Servers RISK: HIGH NESSUS ID:12098<br />

Description: Synopsis :\n\nAn attacker may be able to access directories outside the FTP root\n\nThe<br />

remote host is running wu-ftpd 2.6.2 or older. There is a bug in this version which may<br />

allow an attacker to bypass the restricted-gid feature and gain unauthorized access to<br />

otherwise restricted directories. In addition, this version is prone to a remote overflow in<br />

the S/KEY authentication.<br />

Solution: Upgrade to wu-ftpd 2.6.3 or later.<br />

CVE-2004-0185<br />

MetaSploit Framework Web Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1209 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 307

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!