27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2002-0466<br />

Hosting Controller Multiple Script Arbitrary Directory Browsing<br />

<strong>PVS</strong> ID: 1701 FAMILY: Web Servers RISK: HIGH NESSUS ID:11746<br />

Description: The Hosting Controller application resides on this server. This version is vulnerable to<br />

multiple remote exploits. See<br />

http://archives.neohapsis.com/archives/bugtraq/2002-01/0039.html for more information<br />

Solution: No solution is known at this time.<br />

CVE-2001-0938<br />

Microsoft IIS bdir.htr Directory Listing<br />

<strong>PVS</strong> ID: 1702 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10577<br />

Description: The file bdir.htr is a default IIS file which can give a malicious user information about your<br />

file system.<br />

Solution: Obtain patch from Microsoft. If not required, delete the file.<br />

CVE Not available<br />

Microsoft IIS 5.0 PROPFIND Remote DoS<br />

<strong>PVS</strong> ID: 1703 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10667<br />

Description: The remote IIS web server has PROPFIND enabled. There is at least one exploit which<br />

utilizes the PROPFIND vector in order to compromise IIS web servers.<br />

Solution: Use URLSCAN to disable PROPFIND requests. In addition, ensure that your system has<br />

installed all relevant IIS patches.<br />

CVE-2001-0151<br />

Microsoft IIS viewcode.asp Arbitrary File Access<br />

<strong>PVS</strong> ID: 1704 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10576<br />

Description: The file viewcode.asp is a default IIS file which can give a malicious user a information<br />

about your file system or source files. Specifically, viewcode.asp can allow a remote user to<br />

potentially read any file on a web server's hard drive.<br />

Solution: Delete the file if not needed, or use suitable access control lists to ensure that the file is not<br />

world-readable.<br />

Family Internet Services 433

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!