27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

Lotus Domino Server Multiple XSS<br />

<strong>PVS</strong> ID: 3226 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running a version of Lotus Domino Server that is prone to multiple<br />

remote Cross-Site Scripting (XSS) flaws. An attacker exploiting this flaw would need to be<br />

able to convince a user to browse to a malicious URI. Successful exploitation would result<br />

in script code executing within the user's browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-4819<br />

ZoneAlarm Personal Firewall < 6.0.667.000 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3227 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ZoneAlarm, a personal firewall for the Windows platform. The client is running<br />

a version of ZoneAlarm that is less than 6.0.667.000. This version of ZoneAlarm is<br />

reported vulnerable to a number of flaws that can render the firewall unuseable or, in some<br />

instances, give the users a false sense of security.<br />

Solution: Upgrade to version 6.0.667.000 or higher.<br />

CVE-2005-3560<br />

DSL/CableModem Internet Gateway Detection<br />

<strong>PVS</strong> ID: 3228 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is advertising Internet Gateway Services. This is common<br />

in many off-the-shelf cable modem or DSL modem hardware. On a production network,<br />

such a device may be inadvertently introducing risk due to a multi-homing of the internal<br />

network.<br />

Solution: Ensure that such devices are allowed by corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ClamAV < 0.86.3 Content-parsing Multiple Overflows<br />

<strong>PVS</strong> ID: 3229 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 829

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!