27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Big Brother Information Disclosure<br />

<strong>PVS</strong> ID: 2511 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Big Brother network monitoring software. Big<br />

Brother gives anonymous users information regarding critical servers, uptime, response<br />

times, and more. An attacker accessing these pages would be able to map out potential<br />

targets. \nThe remote host is running Big Brother version: %L<br />

Solution: Protect the servers by using ACLs or firewalls.<br />

CVE Not available<br />

Dillo < 0.8.4-rc1 Interface Message Format String<br />

<strong>PVS</strong> ID: 2512 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is using Dillo, an alternative web browser for Unix and Linux.\nThe remote version of<br />

this software is vulnerable to a format string vulnerability. This may allow an attacker to<br />

overwrite data in memory.<br />

Solution: Upgrade to version 0.8.4-rc1 or higher.<br />

CVE-2005-0012<br />

PHPWind Board < 2.0.2 faq.php Remote File Inclusion<br />

<strong>PVS</strong> ID: 2513 FAMILY: CGI RISK: HIGH NESSUS ID:16122<br />

Description: The remote host is running PHPWind Board, a web based bulletin board. There is a remote<br />

file inclusion vulnerability in older versions of this software that may allow an attacker to<br />

gain a shell on this host.<br />

Solution: Upgrade to version 2.0.2 or higher.<br />

CVE Not available<br />

SNAP <strong>Network</strong> Attached Server Administration Page<br />

<strong>PVS</strong> ID: 2514 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running the SNAP <strong>Network</strong> Attached Server. A SNAP server is a device<br />

that allows easy creation of network-attached services. SNAP ships with a default web<br />

server that allows anonymous users to peruse device configuration information, user lists,<br />

Administrative tasks, and more.<br />

Solution: Use ACLs to protect the SNAP <strong>Network</strong> Attached Server web pages.<br />

Family Internet Services 639

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!