27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is portable OpenSSH 3.7p1 or 3.7.1p1.\nVersions older<br />

than 3.7.1p2 are vulnerable to a flaws that handle PAM authentication and may allow an<br />

attacker to gain a shell on this host. For your information, the version of OpenSSH is: \n<br />

%L<br />

Solution: Upgrade to OpenSSH 3.7.1p2 or higher or disable PAM support in sshd_config.<br />

OpenSSH Detection<br />

CVE-2003-0786<br />

<strong>PVS</strong> ID: 1997 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an OpenSSH server.<br />

Solution: N/A<br />

CVE Not available<br />

PuTTY < 0.55 modpow Function Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 1998 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of PuTTY or of a PuTTY-based software (eg. PSCP or<br />

WinSCP). PuTTY is a SSH client built for Linux and UNIX variants as well as Microsoft<br />

Windows operating systems. Reportedly PuTTY is affected by a remote, pre-authentication<br />

memory corruption vulnerability and by a buffer overrun in its SCP client. The version of<br />

PuTTY installed on the remote client is: %L<br />

Solution: Upgrade to PuTTY 0.55 or higher.<br />

CVE-2004-1440<br />

Putty < 0.54 SSH2 Authentication Password Persistence Weakness<br />

<strong>PVS</strong> ID: 1999 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using a vulnerable version of PuTTY, a SSH<br />

client built for Linux and UNIX variants as well as Microsoft Windows operation systems.<br />

It has been reported that PuTTY does not safely handle password information. As a result, a<br />

local user may be able to recover authentication passwords. The version of PuTTY installed<br />

on the remote host is: %L<br />

Solution: Upgrade to PuTTY 0.54 or higher.<br />

CVE-2003-0048<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 510

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!