27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote server is running a MetaSploit Framework server. Metasploit<br />

allows users to easily exploit and backdoor vulnerable applications via the network. The<br />

fact that there is one running on your network may be indicative of a penetration testing<br />

team or malicious individual exploiting weaknesses on the network.\nFor your information,<br />

the remote server is running %L<br />

Solution: Ensure that this server is sanctioned by policy and guidelines regarding acceptable<br />

network usage.<br />

CVE Not available<br />

Courier IMAP Server < 3.0.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1210 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:12103<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow\n\nThe remote mail server<br />

is the Courier-IMAP imap server. Versions of Courier-IMAP prior to 3.0.7 are prone to a<br />

remote buffer overflow and a remote format string vulnerability.<br />

Solution: If applicable, upgrade to Courier-Imap 3.0.7 or later.<br />

CVE-2004-0777<br />

HP Jet Admin 7.x Traversal Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 1211 FAMILY: Web Servers RISK: LOW NESSUS ID:12120<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw\n\nThe remote<br />

host is an HP Web JetAdmin server. 7.X versions of this server are vulnerable to a<br />

directory traversal attack which can reveal the contents of arbitrary files, or be used to<br />

execute arbitrary commands.<br />

Solution: Set a password for the JetAdmin and ensure that you are running the latest version of the<br />

Webserver software. In addition, the device supports IP-based Access Control Lists (ACLs)<br />

which can be used to restrict access to only valid administrators.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Squid Proxy < 2.5.STABLE6 %xx URL Encoding ACL Bypass<br />

<strong>PVS</strong> ID: 1212 FAMILY: Web Servers RISK: HIGH NESSUS ID:12124<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication\n\nThe remote squid caching proxy, according to its version number, is<br />

vulnerable to a flaw that may allow an attacker to gain access to unauthorized resources.<br />

The flaw in itself consists of sending a malformed username containing the %00 (null)<br />

character, that may allow an attacker to access otherwise restricted resources.<br />

Solution: Upgrade to squid 2.5.STABLE6 or later.<br />

Family Internet Services 308

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!