27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 1919 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized by corporate<br />

policy.\n\nA SETI@HOME client appears to be running on this port. This program may be<br />

used by malicious users to get your system information (processor type and the operating<br />

system). SETI@HOME client versions prior to 3.08 are vulnerable to a buffer overflow<br />

attack.<br />

Solution: Uninstall the program if it is not necessary.<br />

CVE Not available<br />

WinGate Telnet Proxy Server Detection<br />

<strong>PVS</strong> ID: 1920 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running a Wingate Telnet Proxy server. If not configured<br />

securely, a Wingate Telnet Proxy server may be used by hackers to conceal their true<br />

origins by bouncing conections through these proxies.<br />

Solution: Uninstall the server if not necessary; otherwise ensure connections to the proxy are only<br />

made by trusted hosts.<br />

CVE-1999-0441<br />

GnoCatan Remote Overflow<br />

<strong>PVS</strong> ID: 1921 FAMILY: Backdoors RISK: HIGH NESSUS ID:11736<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running GnoCatan, a game server for the GNOME environment. There is a buffer overflow<br />

in this service that may allow a remote attacker to gain a shell on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

NetBIOS Name Service Reply Information Disclosure<br />

<strong>PVS</strong> ID: 1922 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11830<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to disclose<br />

memory.\n\nThe remote host is running a version of the NetBT name service which suffers<br />

from a memory disclosure problem.\nAn attacker may send a special packet to the remote<br />

NetBT name service, and the reply will contain random arbitrary data from the remote host<br />

memory. This arbitrary data may be a fragment from the web page the remote user is<br />

viewing, or something more serious like a cleartext password.\nAn attacker may use this<br />

flaw to continuously 'poll' the content of the memory of the remote host and might be able<br />

Family Internet Services 489

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!