27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 1982 FAMILY: SSH RISK: LOW NESSUS ID:10965<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of the SSH daemon older than 3.1.2 or<br />

equal to 3.0.0. There is a vulnerability in this release that may, under some circumstances,<br />

allow users to authenticate using a password whereas it is not explicitly listed as a valid<br />

authentication mechanism. An attacker may use this flaw to brute force a password using a<br />

dictionary attack (if the password used is weak). The remote server is running SSH version:<br />

\n %L<br />

Solution: Upgrade to SSH 3.1.2 or higher.<br />

CVE-2002-1646<br />

SSH < 3.0.1 Locked Account Remote Authentication Bypass<br />

<strong>PVS</strong> ID: 1983 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10708<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote host is running SSH 3.0.0. There is a vulnerability in this<br />

release which allows any user to log into accounts that have passwords of two characters<br />

long or less. An attacker may gain root privileges using this flaw.<br />

Solution: Upgrade to SSH 3.0.1 or higher.<br />

CVE-2001-0553<br />

Portable OpenSSH < 3.6.1p2 PAM Timing Side-Channel Weakness<br />

<strong>PVS</strong> ID: 1984 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11574<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is using a version of Portable OpenSSH that may allow an<br />

attacker to determine if an account exists or not by a timing analysis.<br />

Solution: Upgrade to OpenSSH-portable 3.6.1p2 or higher.<br />

CVE-2003-0190<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OpenSSH < 2.3.2 SSHv2 Public Key Authentication Bypass<br />

<strong>PVS</strong> ID: 1985 FAMILY: SSH RISK: HIGH NESSUS ID:10608<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running OpenSSH 2.3.1. This version is vulnerable to<br />

a flaw that allows any attacker who can obtain the public key of a valid SSH user to log<br />

into this host without any authentication.<br />

Family Internet Services 506

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!