27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-0099<br />

PostgreSQL < 7.2.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 1892 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11456<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote PostgreSQL server is vulnerable to various flaws which may<br />

allow an attacker who has the right to query the remote database to obtain a shell on this<br />

host.<br />

Solution: Upgrade to PostgreSQL 7.2.3 or higher.<br />

CVE-2002-1399<br />

PostgreSQL < 7.2.3 Multiple Vulnerabilities (2)<br />

<strong>PVS</strong> ID: 1893 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11456<br />

Description: Synopsis :\n\nThe remote host can be tricked into giving a user a shell.\n\nThe remote<br />

PostgreSQL server is vulnerable to various flaws which may allow an attacker who has the<br />

right to query the remote database to obtain a shell on this host.<br />

Solution: Upgrade to PostgreSQL 7.2.3 or higher.<br />

CVE-2002-1398<br />

Oracle 9iAS Administrative Web Interface Authentication Weakness<br />

<strong>PVS</strong> ID: 1894 FAMILY: Web Servers RISK: HIGH NESSUS ID:11452<br />

Description: The remote Oracle 9i Application Server administrative interface runs on this port. Make<br />

sure that the access to this interface is restricted to the persons who are in charge of this<br />

server.<br />

Solution: Impose Access Control Lists (ACLs) on the administrative interface.<br />

CVE-2002-0561<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

McAfee ePolicy Orchestrator Remote Format String<br />

<strong>PVS</strong> ID: 1895 FAMILY: Generic RISK: HIGH NESSUS ID:11409<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

server is running McAfee ePolicy Orchestrator. This service *might* be vulnerable to a<br />

format string attack which may allow an attacker to execute arbitrary commands with the<br />

SYSTEM privileges.<br />

Family Internet Services 482

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!