27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Knox Arkeia <strong>Network</strong> Backup Server Detection<br />

<strong>PVS</strong> ID: 2634 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Arkeia <strong>Network</strong> Backup Server. This server is used to<br />

automatically connect to client machines and retrieve backups on a regular schedule.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Knox Arkeia Type 77 Request Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2635 FAMILY: Generic RISK: HIGH NESSUS ID:17158<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Arkea <strong>Network</strong> Backup agent, an agent system designed to remotely perform<br />

backups of the remote host. The remote version of this agent contains a buffer overflow<br />

vulnerability that may allow an attacker to execute arbitrary commands on the remote host<br />

with the privileges of the Arkeia daemon.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0491<br />

ZeroBoard Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2636 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running ZeroBoard, a web-based bulletin board written in PHP. This version<br />

of Zeroboard is vulnerable to a cross-site scripting (XSS) flaw as well as a flaw in the<br />

'preg_replace' function. An attacker exploiting\n these flaws would require that the attacker<br />

be able to:\n1) convince an unsuspecting user to visit a malicious website\n2) send HTTP<br />

requests that are parsed by the 'preg_replace' function. Successful exploitation leads to<br />

arbitrary code execution on the remote system or arbitrary code executing in client<br />

browsers (after following a malicious URI).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1820<br />

PuTTY < 0.57 SFTP Remote Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2637 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of PuTTY, a SSH client built for Linux and UNIX variants as<br />

well as Microsoft Windows operating systems. This version of PuTTY does not properly<br />

handle an integer value passed from the SSH Server during an SFTP connection. An<br />

attacker exploiting this flaw would need to be able to convince a user to use PuTTY to<br />

Family Internet Services 673

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!