27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host has a backdoor installed\n\nThe remote host is running<br />

EvilFTP. EvilFTP is a backdoor that sets up an FTP server on your machine.<br />

Solution: To remove this backdoor on Windows 95 and 98, delete the line "Run<br />

CVE Not available<br />

Trojan/Backdoor - Phase Zero Detection<br />

<strong>PVS</strong> ID: 1916 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nPhase Zero is installed. This<br />

backdoor allows anyone to partially take the control of the remote system. An attacker may<br />

use it to steal your password or prevent your system from working properly.<br />

Solution: Look for the registry key MsgServ in<br />

HKLM\Software\Microsoft\Windows\CurrentVersion\Run with value msgsvr32.exe.<br />

Search for any suspicious files in the run key, and if found locate the file, open it and<br />

search for the text string "phAse Zero". If found, then delete that file and delete the registry<br />

value from the registry. Manually inspect and repair this system<br />

CVE Not available<br />

Trojan/Backdoor - SubSeven Detection<br />

<strong>PVS</strong> ID: 1917 FAMILY: Backdoors RISK: HIGH NESSUS ID:10409<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nThis host seems to be running<br />

SubSeven on this port. SubSeven is trojan which allows an intruder to take the control of<br />

the remote computer. An attacker may use it to steal your passwords, modify your data, and<br />

prevent your system from working properly.<br />

Solution: Use an up-to-date virus scanner to remove SubSeven or reinstall your system.<br />

CVE Not available<br />

Trojan/Backdoor - SyGate Detection<br />

<strong>PVS</strong> ID: 1918 FAMILY: Backdoors RISK: HIGH NESSUS ID:10274<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe SyGate engine remote controller seems to be running on this port. It<br />

may be used by malicious users which are on the same subnet as yours to reconfigure this<br />

SyGate engine.<br />

Solution: Uninstall the engine if not necessary.<br />

CVE-2000-0113<br />

SETI@HOME Client Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 488

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!