27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Make Love Not Spam Screen Saver Detection<br />

<strong>PVS</strong> ID: 2443 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the 'Make Love Not Spam' screensaver.<br />

This screensaver, downloaded from Lycos, participates in a Denial of Service (DoS) attack<br />

against known spammers.<br />

Solution: Ensure that running this client is within acceptable use.<br />

CVE Not available<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2004-12-02)<br />

<strong>PVS</strong> ID: 2444 FAMILY: Operating System Detection RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing <strong>Security</strong> Update 2004-12-02. This security update contains a number<br />

of enhancements for the following programs :\n\n - Apache\n - Apache2\n - AppKit\n -<br />

Cyrus IMAP\n - HIToolbox\n - Kerberos\n - Postfix\n - PSNormalizer\n - QuickTime<br />

Streaming Server\n - Safari\n - Terminal<br />

Solution: http://docs.info.apple.com/article.html?artnum<br />

CVE-2004-1089<br />

PAFileDB Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 2445 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15911<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is using PAFileDB.\nAccording to its version number, the<br />

remote version of this software is vulnerable to path and password hash disclosure. This<br />

may allow an attacker to perform brute force attack on the password hash and gain access<br />

to account information.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1219<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ViewCVS < 1.0-dev Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 2446 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 620

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!