27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nA Cisco shell server was noted on the host. Typically, shells are used by<br />

remote users to manage operating systems. Shells that pass traffic in plaintext introduce a<br />

risk to confidentiality and privacy. In addition, many shells are used by malicious<br />

individuals as part of a Trojan program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detection (MV/9600)<br />

<strong>PVS</strong> ID: 1944 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells which pass traffic in plaintext introduce a risk to confidentiality<br />

and privacy. In addition, many shells are used by malicious individuals as part of a Trojan<br />

program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Citrix MetaFrame Published Application Enumeration<br />

<strong>PVS</strong> ID: 1945 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11138<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote Citrix server is configured in such a way as to allow anonymous<br />

remote users to enumerate services.<br />

Solution: Contact Citrix for a workaround, patch, or configuration option to mitigate this risk<br />

CVE Not available<br />

LDAP NULL Base Connection<br />

<strong>PVS</strong> ID: 1946 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10722<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nImproperly configured LDAP servers will allow the directory BASE to be set to<br />

NULL. This allows information to be obtained without any prior knowledge of the<br />

directory structure. Coupled with a NULL BIND, an anonymous user can query your<br />

LDAP server using a tool such as LdapMiner<br />

Solution: Disable NULL base connections.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 496

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!