27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to MySQL 3.23.55 or higher.<br />

CVE-2003-0073<br />

ClarkConnect Linux clarkconnectd Information Disclosure<br />

<strong>PVS</strong> ID: 1909 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11277<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files or data.\n\nThe daemon 'clarkconnectd' seems to be running on this port.<br />

This daemon can provide sensitive information to attackers, such as the list of running<br />

processes, the content of /var/log/messages, the snort log file and more. An attacker may<br />

use it to gain more knowledge about this host.<br />

Solution: No solution is known at this time.<br />

CVE-2003-1379<br />

Trojan/Backdoor - DeepThroat Detection<br />

<strong>PVS</strong> ID: 1910 FAMILY: Backdoors RISK: HIGH NESSUS ID:10053<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nDeepThroat is installed on the<br />

remote host. This backdoor allows anyone to partially take the control of the remote<br />

system. An attacker may use it to steal your password or prevent your computer from<br />

working properly.<br />

Solution: Use RegEdit, and find 'SystemDLL32' in<br />

HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run. The value's data is the path<br />

of the file. If you are infected by DeepThroat 2 or 3, then the registry value is named<br />

'SystemTray'.<br />

CVE Not available<br />

Trojan/Backdoor - NetSphere Detection<br />

<strong>PVS</strong> ID: 1911 FAMILY: Backdoors RISK: HIGH NESSUS ID:10005<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nNetSphere is installed. This<br />

backdoor allows anyone to partially take control of the remote system. An attacker may use<br />

this vulnerability to steal your password or prevent your system from working properly.<br />

Solution: Telnet to this computer on TCP port 30100 and type : '', without the quotes,<br />

and press Enter. This will stop the NetSphere service. Manually inspect and repair this<br />

system.<br />

CVE Not available<br />

Trojan/Backdoor - GateCrasher Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 486

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!