27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2005-1897<br />

Sawmill < 7.1.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2947 FAMILY: Web Servers RISK: NONE NESSUS ID:18507<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running Sawmill, an application for analyzing web logs. Sawmill<br />

typically is viewed via a web front-end and works off of a MySQL server. This<br />

version of Sawmill is vulnerable to multiple remote flaws. While some of the flaws<br />

have not yet been fully disclosed, it is believed that the flaws will lead to either<br />

privilege escalation or Cross-Site Scripting (XSS). An attacker exploiting these<br />

flaws would either require credentials or require that a user browse to a malicious<br />

URI.<br />

Solution: Upgrade to version 7.1.6 or higher.<br />

CVE-2005-1900<br />

KAME/racoon VPN Detection<br />

<strong>PVS</strong> ID: 2948 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a KAME Racoon VPN Server.\n\nA VPN (Virtual Private<br />

<strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were local<br />

users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between the<br />

remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Microsoft Windows 2000 VPN Detection<br />

<strong>PVS</strong> ID: 2949 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the Microsoft Windows 2000 VPN Server.\n\nA VPN (Virtual<br />

Private <strong>Network</strong>) allows remote users to connect to an\ninternal network as if they were<br />

local users. A VPN that allows\nsplit-tunneling will essentially serve as a bridge between<br />

the remote\nnetwork and the internal network. Special care should be taken to\nensure that<br />

remote VPN clients connect securely and do not introduce\nan unacceptable level of risk to<br />

the internal computing environment.<br />

Solution: Ensure that the VPN is acceptable with respect to corporate guidelines and policies.<br />

CVE Not available<br />

Netscreen VPN Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 765

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!