27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running Looking Glass, a tool for performing<br />

rudimentary router functions via a web interface. If available to anonymous users, this<br />

application can give away information that would enable an attacker to perform more<br />

sophisticated (or targeted) attacks against internal networks or specific networking<br />

equipment.<br />

Solution: Either disable or protect (with ACLs) the web application from anonymous,<br />

unauthenticated users.<br />

CVE Not available<br />

NTOP <strong>Network</strong> Tool Detection<br />

<strong>PVS</strong> ID: 2719 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running NTOP, a tool for viewing network configuration,<br />

usage, statistics, protocols, and much more via a web interface. If available to anonymous<br />

users, this application can give away information that would enable an attacker to perform<br />

more sophisticated (or targeted) attacks against internal networks or specific<br />

internetworking equipment.<br />

Solution: Either disable or protect (with ACLs) the web application from anonymous,<br />

unauthenticated users.<br />

CVE Not available<br />

NTOP Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2720 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running NTOP, a tool for viewing network configuration, usage, statistics,<br />

protocols, and much more via a web interface. This version of NTOP is reported to be<br />

prone to at least four (4) vulnerabilities. An attacker exploiting these flaws would be able to<br />

execute arbitrary code on the target server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2000-0706<br />

ZoneAlarm < 5.5.062.011 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2721 FAMILY: Generic RISK: LOW NESSUS ID:14726<br />

Family Internet Services 699

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!