27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Linux Telnet)<br />

<strong>PVS</strong> ID: 1927 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Linux telnet shell server was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells that pass traffic in plaintext introduce<br />

a risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (HP-UX High Port)<br />

<strong>PVS</strong> ID: 1928 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn HP-UX shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Cisco Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1929 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Cisco shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

Family Internet Services 491

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!