27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote BIND server, according to its version number, has a flaw in the way<br />

'authvalidator()' is implemented. An attacker may be able to launch a denial of service<br />

attack against the remote service.<br />

Solution: Upgrade to Bind 8.4.6 or higher or the newest version of BIND 9.<br />

CVE-2005-0034<br />

Cisco IOS 12.0 IPv6 Remote DoS<br />

<strong>PVS</strong> ID: 2558 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n The<br />

remote Cisco device has enabled IPv6. On many Cisco devices, it may be possible to make<br />

the remote device crash when sending it malformed IPv6 packets. These vulnerabilities<br />

would allow a remote attacker to potentially cause the Cisco machine to reboot repeatedly,<br />

causing a loss of availability.<br />

Solution: Ensure that IPv6 functionality is required and then ensure that a patched version of Cisco<br />

IOS is installed.<br />

CVE Not available<br />

gpsd < 2.8 gpsd_report() Function Remote Format String<br />

<strong>PVS</strong> ID: 2559 FAMILY: Generic RISK: HIGH NESSUS ID:16265<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running GPSD, a daemon that monitors a GPS device\nand publishes its data over<br />

the network.\n\nThe remote version of this software is vulnerable to format string<br />

attack\ndue to the way it uses the syslog() call. An attacker may exploit this flaw\nto<br />

execute arbitrary code on the remote host.<br />

Solution: Upgrade to gpsd 2.8 or higher.<br />

gpsd Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 2560 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running GPSD, a daemon that monitors a GPS device and publishes its<br />

data over the network.<br />

Solution: Ensure that this server/service is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 652

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!