27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 2.0.20 or higher.<br />

Zotob Worm Infection<br />

CVE-2005-3420<br />

<strong>PVS</strong> ID: 3164 FAMILY: Backdoors RISK: HIGH NESSUS ID:19429<br />

Description: Synopsis :\n\nThe remote host has a backdoor installed.\n\nA Microsoft Windows shell is<br />

running on port 8888. This may indicate an infection by the Zotob worm, although other<br />

worms may also create a shell on this host.\n\nThe remote host has been compromised.<br />

Solution: Manually inspect and repair this system.<br />

Zotob Worm Infection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3165 FAMILY: FTP Servers RISK: HIGH NESSUS ID:19429<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host is infected with the Zotob Worm.<br />

Solution: Manually inspect and repair the remote host.<br />

Zotob Worm Infection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3166 FAMILY: FTP Servers RISK: HIGH NESSUS ID:19429<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host is infected with the Zotob Worm.<br />

Solution: Manually inspect and repair the remote host.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Discuz File Extension Validation Weakness Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3167 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running Discuz, a web-based message board. This version of Discuz is vulnerable to a<br />

flaw that would allow remote attackers to upload arbitrary files to the web server. The<br />

attacker could then execute the uploaded file (with the permission of the web server) or<br />

convince other Discuz users to download and/or execute the code. An attacker exploiting<br />

this flaw would be able to gain access to confidential data, potentially impact the<br />

availability of the server, and tarnish the integrity of the server.<br />

Family Internet Services 812

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!