27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nThe remote host is running the LeafNode NNTP server. The version of<br />

LeafNode that is installed is vulnerable to a denial of service attack that may be<br />

abused by an attacker to cause this system to fail.<br />

Solution: Upgrade to LeafNode 1.9.30 or higher.<br />

CVE-2002-1661<br />

NNTP Server Type and Version<br />

<strong>PVS</strong> ID: 1888 FAMILY: Generic RISK: LOW NESSUS ID:10159<br />

Description: The remote host is running a NNTP server. Its banner is : \n%L<br />

Solution: N/A<br />

CVE Not available<br />

tanned < 0.7.2 Remote Format String<br />

<strong>PVS</strong> ID: 1889 FAMILY: Generic RISK: HIGH NESSUS ID:11495<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote format string flaw.\n\nThe remote<br />

host is running tanned. Some versions of this software are vulnerable to a format string<br />

attack which may allow an attacker to get a root shell on this host.<br />

Solution: Upgrade to tanned 0.7.2 or higher.<br />

apcupsd Detection<br />

CVE-2003-1236<br />

<strong>PVS</strong> ID: 1890 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running apcupsd, a APC battery manager backup unit manager.<br />

The remote host is running the following version of this software : \n%L<br />

Solution: N/A<br />

apcupsd Overflow<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1891 FAMILY: Generic RISK: HIGH NESSUS ID:11484<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of apcupsd which is vulnerable to a buffer overflow. An attacker could<br />

exploit this flaw to gain a root shell on this host.<br />

Family Internet Services 481

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!