27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running a version of SSH which is older than<br />

(or as old as) 1.2.23. This version is vulnerable to a known plaintext attack that may allow<br />

an attacker to insert encrypted packets in the client - server stream that will be deciphered<br />

by the server, thus allowing an attacker to execute arbitrary commands on the remote<br />

server.<br />

Solution: Upgrade to SSH-1.2.25 or higher.<br />

CVE-1999-1085<br />

OpenSSH Client < 2.3.0 X11 Unauthorized Remote Forwarding<br />

<strong>PVS</strong> ID: 1979 FAMILY: SSH RISK: HIGH NESSUS ID:11343<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running OpenSSH SSH client older than 2.3.0.<br />

This version does not properly disable X11 or agent forwarding, which could allow a rogue<br />

SSH server to gain access to the X11 display of the client and eavesdrop X11 events.<br />

Solution: Upgrade to version 2.3.0 or higher.<br />

CVE-2000-1169<br />

SSH1 CRC-32 detect_attack Function Overflow<br />

<strong>PVS</strong> ID: 1980 FAMILY: SSH RISK: HIGH NESSUS ID:10607<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of SSH.com's SSH older than version 1.2.32 or a version of OpenSSH older<br />

than 2.3.0. These versions are vulnerable to a buffer overflow that may allow an attacker to<br />

obtain a root shell on this host.<br />

Solution: Upgrade to SSH.com's SSH 1.2.32 or OpenSSH 2.3.0 or higher.<br />

CVE-2001-0144<br />

SSH-1 < 1.2.31 SSH Daemon Account Login Attempt Logging Failure<br />

<strong>PVS</strong> ID: 1981 FAMILY: SSH RISK: HIGH NESSUS ID:11341<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote SSH daemon does not log repeated login attempts, which allows an<br />

attacker to set up a brute force attack to guess the user accounts/passwords of on this host.<br />

Solution: Upgrade to SSH 1.2.31 or higher.<br />

CVE-2001-0471<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SSH < 3.1.2 AllowedAuthentications Remote Bypass<br />

Family Internet Services 505

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!