27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PostgreSQL < 8.0.1 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2583 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote PostgreSQL server is vulnerable to a number of critical flaws. Some of these flaws<br />

require an attacker to have a valid account with credentials; however, some of the attacks<br />

do not require the attacker to have any sort of credentials.<br />

Solution: Upgrade to PostgreSQL 8.0.1 or higher.<br />

CVE-2005-0247<br />

Cisco IDS Plaintext Telnet Service Detection<br />

<strong>PVS</strong> ID: 2584 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host is running the Cisco IDS %L \nThe IDS administrator has<br />

enabled the plaintext telnet service. An attacker sniffing the local network can determine<br />

the user ID and password required to administer the machine.<br />

Solution: Ensure that telnet is required in order to administer the machine.<br />

CVE Not available<br />

Newspost < 2.0-r1 socket_getline Function Remote Overflow<br />

<strong>PVS</strong> ID: 2585 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using the Newspost NNTP client. Newspost is used to automate the sending of binary files<br />

to different NNTP servers. There is a flaw in this version of Newspost that would allow the<br />

operator of a malicious news server to create a buffer overflow within the Newspost client.<br />

In order to execute this attack, the attacker would need to be able to convince a Newspost<br />

user to submit a post to the malicious NNTP server. The remote host is running Newspost<br />

version: %L<br />

Solution: Upgrade to version 2.0-r1 or higher.<br />

CVE-2005-0101<br />

Ventia DeskNow Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2586 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 659

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!