27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 2489 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10629<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote Lotus Domino server is running with the default<br />

administrative databases. An attacker finding these databases may be able to pull<br />

confidential data from the remote database.<br />

Solution: Restrict access to these databases.<br />

CVE-2002-0664<br />

Big Sister Information Leak<br />

<strong>PVS</strong> ID: 2490 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Big Sister network monitoring software. Big Sister<br />

gives anonymous users quite a bit of information regarding critical servers, uptime,<br />

response times, and more. An attacker accessing these pages would be able to map out<br />

potential targets<br />

Solution: Use ACLs or firewalls to prevent network-based access.<br />

CVE Not available<br />

Squid Server Report Information Disclosure<br />

<strong>PVS</strong> ID: 2491 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Squid proxy. The server has web-based proxy<br />

reporting enabled. An attacker viewing these pages would be able to gain information that<br />

may be useful in future attacks.<br />

Solution: Use ACLs to protect the Squid proxy reports.<br />

CVE Not available<br />

Ganglia Cluster Report Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2492 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Ganglia Cluster Toolkit. This toolkit is used to<br />

manage and display information regarding critical servers. Anonymous users who access<br />

this toolkit would be able to peruse the different machines in the cluster. In addition, they<br />

would be able to query each specific machine for information regarding OS level, current<br />

load and more.<br />

Family Internet Services 633

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!