27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

Generic Botnet Client Detection<br />

<strong>PVS</strong> ID: 3150 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be running a machine that has been compromised<br />

and is being controlled by a botnet. A botnet is a network of compromised computers that<br />

are remotely controlled by a malicious bot administrator. Botnets are commonly used<br />

for\nsending spam\nrunning Denial of Service (DoS) attacks against other<br />

networks\nscanning and compromising new systems\nInstalling sniffers\nInstalling<br />

keyloggers\nIdentify theft \nThe observed command was '%L'<br />

realtime<br />

Solution: Manually inspect the machine for malicious processes. In addition, you may wish to<br />

consider installing security software that detects and blocks this sort of malicious software.<br />

CVE Not available<br />

MDaemon < 8.1.0 Content Filter Traversal Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3151 FAMILY: Web Servers RISK: HIGH NESSUS ID:19310<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Alt-N MDaemon, an SMTP/IMAP server for Windows. According to its<br />

banner, the version of MDaemon on the remote host is prone to a directory traversal flaw<br />

that can be exploited to overwrite files outside the application's quarantine directory<br />

provided MDaemon's attachment quarantine feature is enabled.<br />

Solution: Upgrade to version 8.1.0 or higher.<br />

CVE Not available<br />

PHPList admin/index.php id Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3152 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPList. PHPList is a PHP application that gathers<br />

handles mailing and customer lists. This version is reported to be prone to a SQL Injection<br />

flaw. An attacker exploiting this flaw would be able to read the database, manipulate the<br />

database, and possibly run commands with the privileges of the web server.<br />

Solution: No solution is known at this time.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 808

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!