27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

War FTP Daemon Detection<br />

<strong>PVS</strong> ID: 1852 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of War FTP Daemon.<br />

Solution: N/A<br />

CVE Not available<br />

Serv-U FTP Server Detection<br />

<strong>PVS</strong> ID: 1853 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nAn FTP Server is running on this port\n\nThe remote host is running a<br />

version of the Serv-U FTP server.<br />

Solution: N/A<br />

CVE Not available<br />

TNFTPD Multiple Signal Handler Remote Superuser Privilege Escalation<br />

<strong>PVS</strong> ID: 1854 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running TNFTPD, a port of the NetBSD FTP daemon. It is reported that this version of<br />

TNFTPD is vulnerable to multiple vulnerabilities in the signal handling functions. An<br />

attacker may remotely gain superuser privileges on the remote host. TNFTPD was formerly<br />

named lukemftpd.<br />

Solution: Upgrade to tnftpd 20040810 or higher.<br />

CVE-2004-0794<br />

BitchX IRC Client "/INVITE" Command Format String DoS<br />

<strong>PVS</strong> ID: 1855 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a version of the BitchX IRC client that may be vulnerable to a format string<br />

attack. BitchX IRC clients, versions 75 up to and including 1.0c16, are vulnerable to a<br />

Denial of Service attack and possible remote execution of code. By /invite-ing someone to<br />

a channel name containing formatting characters an IRC user can cause the targeted user's<br />

BitchX client to seg-fault.<br />

Solution: Upgrade according to vendor recommendations.<br />

CVE-2000-0594<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 471

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!