27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

anonymous users to possibly inject files into the virtual filesystem.<br />

Solution: Ensure that corporate policies and guidelines allow users to store data on public Internet<br />

servers.<br />

CVE Not available<br />

Sophos Control Center Detection<br />

<strong>PVS</strong> ID: 3343 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sophos Control Center. Sophos is an antivirus software and<br />

the Control Center allows the central management of multiple Sophos clients.<br />

Solution: Ensure that you are running the latest version of Sophos Control Center.<br />

CVE Not available<br />

WinProxy < 6.1a Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3344 FAMILY: FTP Servers RISK: HIGH NESSUS ID:20393<br />

Description: Synopsis :\n\nThe remote proxy is affected by multiple vulnerabilities.\n\nThe remote host<br />

is running WinProxy, a proxy server for Windows. This version of WinProxy suffers from<br />

denial of service and buffer overflow vulnerabilities in its telnet and web proxy servers. An<br />

attacker may be able to exploit these issues to crash the proxy or even execute arbitrary<br />

code on the affected host.<br />

Solution: Upgrade to version 6.1a or higher.<br />

CVE-2005-3654<br />

HylaFAX < 4.2.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3345 FAMILY: Generic RISK: HIGH NESSUS ID:20387<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running HylaFAX, a fax transmission software. It is reported that HylaFAX is prone to a<br />

number of flaws that would allow a remote attacker to execute arbitrary commands with the<br />

permission of the process running HylaFAX. In addition, the application is vulnerable to a<br />

flaw that would allow remote attackers to bypass authentication, giving them administrative<br />

access without the proper credentials. An attacker exploiting either of these flaws will be<br />

able to gain control of the remote HylaFAX server.<br />

Solution: Upgrade to version 4.2.4 or higher.<br />

TFTP Client Detection<br />

CVE-2005-3538<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3346 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 863

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!