27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

MikroTik Router Detection<br />

<strong>PVS</strong> ID: 2515 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is a MikroTik router.<br />

Solution: Ensure that this router and default web pages are in accordance with corporate policies.<br />

CVE Not available<br />

Oracle HTTP Listener Default Web Page Detection<br />

<strong>PVS</strong> ID: 2516 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10849<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Oracle HTTP Configuration interface. This<br />

interface allows anonymous users to view configuration details. In addition, an attacker<br />

may be able to make configuration changes if the default settings are in place.<br />

Solution: Lock down or remove the Oracle HTTP Configuration interface.<br />

CVE Not available<br />

HylaFAX < 4.2.1 Remote Access Control Bypass<br />

<strong>PVS</strong> ID: 2517 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running HylaFAX, a fax<br />

transmission software. It is reported that HylaFAX is prone to an access control<br />

bypass vulnerability. An attacker exploiting this flaw may be able to gain<br />

unauthorized access to the service.<br />

Solution: Upgrade to version 4.2.1 or higher.<br />

CVE Not available<br />

POP Password Changer Unauthorized Password Change<br />

<strong>PVS</strong> ID: 2518 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication\n\nThe remote host is running POP Password Changer, a server used to<br />

change POP users' passwords, that is vulnerable to unauthorized access. An attacker<br />

exploiting this flaw will be able to change users' passwords.<br />

Family Internet Services 640

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!