27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

and eventually get access to this host.<br />

Solution: Upgrade F-Secure SSH to a version greater than 3.1.<br />

SSH Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1967 FAMILY: SSH RISK: NONE NESSUS ID:10267<br />

Description: The remote host is running a SSH server : \n %L<br />

Solution: N/A<br />

SSH Client Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 1968 FAMILY: SSH RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is running a SSH client: %L<br />

Solution: N/A<br />

CVE Not available<br />

SSH < 3.1.5 / 3.2.2 setsid() Privilege Escalation<br />

<strong>PVS</strong> ID: 1969 FAMILY: SSH RISK: HIGH NESSUS ID:11169<br />

Description: Synopsis :\n\nThe remote host may allow users to escalate privileges.\n\nThe remote host is<br />

running a version of the SSH server which is older than version 3.1.5 or 3.2.2. There is a<br />

vulnerability in this version which may allow a user to obtain higher privileges due to a<br />

flaw in the way setsid() is used. The remote host is running : %L<br />

Solution: Upgrade to version 3.1.5, 3.2.2 or higher.<br />

CVE-2002-1644<br />

scp < 2.1 Traversal File Create/Overwrite<br />

<strong>PVS</strong> ID: 1970 FAMILY: SSH<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11339<br />

Description: Synopsis :\n\nThe remote server may allow attackers to retrieve or modify sensitive<br />

files.\n\nThe remote host is running SSH 1.2.3 or 1.2 (as a client). There is a vulnerability<br />

in this version that allows a malicious scp server to overwrite arbitrary files via a directory<br />

traversal bug. An attacker may use this flaw to compromise this host. To exploit it, the<br />

attacker would have to compromise a host to which users of this host are SSH'ing into, and<br />

then to set up a trojaned version of scp which would overwrite files on this host<br />

Family Internet Services 502

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!