27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Generic Shell Detection (AIX Telnet)<br />

<strong>PVS</strong> ID: 1940 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nAn AIX shell server ( %L ) was noted on the host. Typically, shells are used<br />

by remote users to manage operating systems. Shells that pass traffic in plaintext introduce<br />

a risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Cisco Telnet)<br />

<strong>PVS</strong> ID: 1941 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (MESA Telnet)<br />

<strong>PVS</strong> ID: 1942 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA shell server was noted on the host. Typically, shells are used by remote<br />

users to manage operating systems. Shells that pass traffic in plaintext introduce a risk to<br />

confidentiality and privacy. In addition, many shells are used by malicious individuals as<br />

part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (Cisco Catalyst)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1943 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 495

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!