27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid and<br />

approved means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detectors (Windows 2000 Telnet)<br />

<strong>PVS</strong> ID: 2321 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality. In<br />

addition, many shells are used by malicious individuals as part of a Trojan program or<br />

remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid and<br />

approved means of managing the remote machine.<br />

CVE Not available<br />

Generic Shell Detectors (3COM SuperStack Telnet)<br />

<strong>PVS</strong> ID: 2322 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: A shell server was noted on the host. Typically, shells are used by remote users to manage<br />

operating systems. Shells that pass traffic in plaintext introduce a risk to confidentiality. In<br />

addition, many shells are used by malicious individuals as part of a Trojan program or<br />

remote buffer overflow exploit.<br />

Solution: Ensure that the remote shell is secured against data leakage and that it is a valid and<br />

approved means of managing the remote machine.<br />

CVE Not available<br />

Identd Service Detection<br />

<strong>PVS</strong> ID: 2323 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running an ident (also known as 'auth') daemon. The 'ident'<br />

service provides sensitive information to potential attackers. It mainly says which accounts<br />

are running which services. This helps attackers to focus on valuable services (those owned<br />

by root). If you do not use this service, disable it.<br />

Solution: Under Unix systems, comment out the 'auth' or 'ident' line in /etc/inetd.conf and restart<br />

inetd.<br />

CVE Not available<br />

Identd Service Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2324 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 585

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!