27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the Endymion MailMan application. This<br />

application allows remote users to access their email via a web interface. There have been<br />

many flaws found in the mailman.cgi perl script. In addition, the current features of<br />

Mailman allow it to be used as a remote attack tool. As Mailman takes Username,<br />

Password, and Server as arguments for login, it is possible to use Mailman as a POP3<br />

scanner and/or brute-force password scanner. For example, an attacker could automate an<br />

attack against internal POP3 accounts by simply bouncing the attack through an instance of<br />

Mailman in the DMZ. An attacker without access to the internal network would still be able<br />

to brute-force valid accounts simply by using Mailman to identify internal POP3 servers<br />

and then bouncing the attack through Mailman.<br />

Solution: Ensure that this application is authorized and properly protected.<br />

CVE Not available<br />

<strong>Network</strong> Query Tool Detection<br />

<strong>PVS</strong> ID: 2743 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the <strong>Network</strong> Query Tool CGI script. This script<br />

allows anonymous, remote users to perform port scans, whois, DNS queries, ping,<br />

traceroute, and more via a web interface. An attacker coming upon this application would<br />

be able to use the script to perform discovery scanning against any range of addresses. This<br />

would include, but not be limited to, internal IP ranges.<br />

Solution: Ensure that this application is valid with respect to corporate policies and guidelines. If the<br />

application is required, consider using Access Control Lists (ACLs) or other security<br />

measures to block unauthorized usage.<br />

CVE Not available<br />

Apache < 2.0.50 Input Header Folding and mod_ssl DoS<br />

<strong>PVS</strong> ID: 2744 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:12293<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of the Apache web server that is less than 2.0.50. This<br />

version is vulnerable to two (2) remote Denial of Service (DoS) attacks. The first issue<br />

stems from a failure to properly manage memory and could lead to the consumption of<br />

massive amounts of memory and, alledgedly,a potential heap overflow. The second issue<br />

stems from mod_ssl's inability to handle sessions that terminate before any bytes of data<br />

have been sent. This second flaw results in a memory violation that leads to a loss of<br />

availability to valid users.<br />

Solution: Upgrade to Apache 2.0.50 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 706

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!