27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of OpenSSH that is older than<br />

3.0.2. Versions prior than 3.0.2 are vulnerable to an environment variables export that can<br />

allow a local user to execute command with root privileges. This problem affects only<br />

versions prior than 3.0.2 when the UseLogin feature is enabled (usually disabled by<br />

default).<br />

Solution: Upgrade to OpenSSH 3.0.2 or higher.<br />

CVE-2001-0872<br />

Dropbear SSH Server Format String<br />

<strong>PVS</strong> ID: 1993 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'format string' flaw\n\nThe remote host is<br />

running a version of the Dropbear SSH server that is vulnerable to a format string attack.<br />

An attacker may use this vulnerability to execute arbitrary code on the SSH server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

OpenSSH < 3.7 buffer_append_space Function Overflow<br />

<strong>PVS</strong> ID: 1994 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running a version of OpenSSH that is<br />

vulnerable to a flaw in the buffer handling functions which may possibly leading to<br />

command execution.<br />

Solution: Upgrade to OpenSSH 3.7 or higher.<br />

CVE-2003-0695<br />

LSH < 1.5 lshd Daemon Remote Overflow<br />

<strong>PVS</strong> ID: 1995 FAMILY: SSH RISK: HIGH NESSUS ID:11843<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of LSH that is vulnerable to a buffer overflow that allows an attacker to<br />

gain a shell on this host.<br />

Solution: Upgrade to LSH 1.5 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Portable OpenSSH < 3.7.1p2 Multiple PAM Vulnerabilities<br />

<strong>PVS</strong> ID: 1996 FAMILY: SSH RISK: HIGH NESSUS ID:11848<br />

Family Internet Services 509

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!