27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Dell Remote Access Controller Detection<br />

<strong>PVS</strong> ID: 2708 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Dell Remote Access Controller, a web-based<br />

management interface for Dell devices. A remote user (or administrator) can, with<br />

credentials, control the machine from within their web browser.<br />

Solution: Ensure that this application is in alignment with existing corporate policies and guidelines.<br />

If the application is not required, disable the service.<br />

CVE Not available<br />

eMule Peer-To-Peer File Sharing Server Detection<br />

<strong>PVS</strong> ID: 2709 FAMILY: Peer-To-Peer File Sharing RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running eMule, a Peer-To-Peer File Sharing<br />

software that allows for uploading and downloading of files. \nFor your information, the<br />

remote host is running %L<br />

Solution: Ensure that this application is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

LimeWire < 4.8.0 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2710 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17973<br />

Description: Synopsis :\n\nThe remote client is vulnerable to an arbitrary file download flaw.\n\nThe<br />

remote host is running LimeWire, a Gnutella client used for peer-to-peer file sharing. The<br />

host is running a version of Limewire that is vulnerable to a remote exploit via a parsing<br />

error. An attacker exploiting this flaw would pass the client a specially formatted request<br />

which, when processed, would give the attacker the ability to download any file on the<br />

Gnutella client.<br />

Solution: Upgrade to version 4.8.0 or higher.<br />

CVE-2005-0789<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpPGAds/phpAdNew < 2.0.5 adframe.php refresh Parameter XSS<br />

<strong>PVS</strong> ID: 2711 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: There is a flaw in the remote phpAdNew/phpPgAds PHP Ads server, a banner management<br />

and tracking\nsystem written in PHP.\n\nThis version of phpAdNew is vulnerable to a<br />

Cross-Site Scripting (XSS)\nvulnerability.\nAn attacker exploiting this flaw would be able<br />

steal potentially confidential\ninformation (such as cookies) or execute malicious code<br />

Family Internet Services 696

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!