27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1440 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

CVE Not available<br />

Wireless Access Point Detection (SNMP)<br />

<strong>PVS</strong> ID: 1441 FAMILY: SNMP Traps<br />

Description: The remote host is a wireless access point.<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11026<br />

Solution: You should ensure that the proper physical and logical controls exist around the AP.<br />

Web Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1442 FAMILY: Web Servers RISK: NONE NESSUS ID:10107<br />

Description: A web server is running on this port. The server string is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

Apache < 2.0.46 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1443 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11507<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote server is running a version of Apache 2.x which is older than 2.0.45.\nThis version<br />

is vulnerable to various flaw :\n- There is a denial of service attack which may allow the<br />

attacker to disable this server remotely.\n- The httpd process leaks file descriptors to child<br />

processes such as CGI scripts. An attacker who has the ability to execute arbitrary CGI<br />

scripts on this server (include PHP code) would be able to write arbitrary data in the files<br />

pointed to (in particular the log files).<br />

Solution: Upgrade to Apache 2.0.46<br />

CVE-2003-0132<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Zope < 2.1.7 DocumentTemplate Unauthorized Modification<br />

Family Internet Services 371

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!