27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 1963 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality and<br />

privacy. In addition, many shells are used by malicious individuals as part of a Trojan<br />

program or remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid, approved<br />

means of managing the remote machine.<br />

CVE Not available<br />

Subversion (SVN) < 1.0.6 Module File Restriction Bypass<br />

<strong>PVS</strong> ID: 1964 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:13848<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve and<br />

modify sensitive files or data.\n\nThe remote host is running a version of Subversion which<br />

is older than 1.0.6. A flaw exists in the apache module mod_authz_svn in older versions.<br />

An attacker can access to any file in a given Subversion repository despite restrictions set<br />

by the administrator.<br />

Solution: Upgrade to Subversion 1.0.6 or higher.<br />

CVE-2004-1438<br />

Rsync < 2.6.3 Sanitize_path Function Module Path Escaping<br />

<strong>PVS</strong> ID: 1965 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve and<br />

modify sensitive files or data.\n\nThe remote host is running a rsync server, a program to<br />

synchronize files and directories structure across a network. The version running on the<br />

host may be vulnerable to a path escaping issue. An attacker may be able to write and read<br />

files in the context of the server.<br />

Solution: Upgrade to rsync 2.6.3 or higher.<br />

CVE-2004-0792<br />

F-Secure SSH Password Authentication Policy Evasion<br />

<strong>PVS</strong> ID: 1966 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12099<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running F-Secure SSH. This version contains a bug which<br />

may allow a user to log in using a password even though the server policy disallows it. An<br />

attacker may exploit this flaw to set up a dictionary attack against the remote SSH server<br />

Family Internet Services 501

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!