27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Policy - Cydoor Topicks Sofware Detection<br />

<strong>PVS</strong> ID: 1236 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software which may be considered<br />

questionable\n\nThe remote host is using the Cydoor Topicks program. You should ensure<br />

that the user intended to install Cydoor (it is sometimes silently installed) and that the use<br />

of Cydoor matches your corporate mandates and security policies.<br />

Solution: Manually uninstall the software.<br />

CVE Not available<br />

Apache Input Header Folding Remote DoS<br />

<strong>PVS</strong> ID: 1237 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12293<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.50. There is<br />

denial of service in Apache httpd 2.0.x by sending a specially crafted HTTP request. It is<br />

possible to consume arbitrary amounts of memory. On 64 bit systems with more than 4GB<br />

virtual memory this may lead to heap based buffer overflow.<br />

Solution: Upgrade to most recent version of Apache.<br />

CVE-2004-0493<br />

Trojan/Backdoor - Apache mod_rootme Detection<br />

<strong>PVS</strong> ID: 1238 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nThe remote system appears to be running the mod_rootme module, this module<br />

silently allows a user to gain root shell access to the machine via crafted HTTP requests.<br />

Solution: - Remove the mod_rootme module from httpd.conf/modules.conf. Consider reinstalling the<br />

computer, as it is likely to have been compromised by an intruder<br />

CVE Not available<br />

Mozilla < 1.7 Multiple Remote Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1239 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote browser is vulnerable to multiple flaws\n\nThe remote<br />

host is using the Mozilla web browser prior to version 1.7. There are several flaws<br />

within this version of Mozilla that include a remote overflow via a spoofed address<br />

bar, an overflow in the SSL certificate store, and other serious issues.<br />

Family Internet Services 315

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!