27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2002-1102<br />

Cisco Multiple DoS (Bug ID CSCdx92043)<br />

<strong>PVS</strong> ID: 2240 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11379<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\n Sending bogus<br />

ICMP redirect packets, a malicious user can either disrupt or intercept communication from<br />

a router. This vulnerability is documented with the CISCO bug ID CSCdx92043<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1222<br />

Cisco Multiple DoS (Bug ID CSCdx92043)<br />

<strong>PVS</strong> ID: 2241 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11379<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nSending bogus<br />

ICMP redirect packets, a malicious user can either disrupt or intercept communication from<br />

a router. This vulnerability is documented with the CISCO bug ID CSCdx92043<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1222<br />

Cisco Multiple DoS (Bug ID CSCdx92043)<br />

<strong>PVS</strong> ID: 2242 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11379<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\n Sending bogus<br />

ICMP redirect packets, a malicious user can either disrupt or intercept communication from<br />

a router. This vulnerability is documented with the CISCO bug ID CSCdx92043<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1222<br />

Cisco TFTP Server Long Filename DoS (Bug ID CSCdy03429)<br />

<strong>PVS</strong> ID: 2243 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:11056<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\n Trivial File Transfer<br />

Protocol (TFTP) is a protocol that allows for easy transfer of files between network<br />

connected devices. A vulnerability has been discovered in the processing of filenames<br />

within a TFTP read request when Cisco IOS is configured to act as a TFTP server. This<br />

vulnerability is documented as Cisco Bug ID CSCdy03429.<br />

Solution: http://www.cisco.com/warp/public/707/ios-tftp-long-filename-pub.shtml<br />

CVE-2002-0813<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 562

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!