27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Windows shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Sys V Telnet)<br />

<strong>PVS</strong> ID: 1934 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Printer Telnet)<br />

<strong>PVS</strong> ID: 1935 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA printer shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (RedHat Telnet)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1936 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA RedHat Linux shell server was noted on the host. Typically, shells are<br />

used by remote users to manage operating systems. Shells that pass traffic in plaintext<br />

introduce a risk to confidentiality and privacy. In addition, many shells are used by<br />

malicious individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Family Internet Services 493

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!