27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (AXIS Telnet)<br />

<strong>PVS</strong> ID: 1937 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (SCO Telnet)<br />

<strong>PVS</strong> ID: 1938 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA SCO shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Informix UniVerse Telnet)<br />

<strong>PVS</strong> ID: 1939 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn Informix shell server was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells which pass traffic in plaintext<br />

introduce a risk to confidentiality and privacy. In addition, many shells are used by<br />

malicious individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 494

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!