27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Internet Explorer Version 7 Detection<br />

<strong>PVS</strong> ID: 3498 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Internet Explorer version 7.<br />

Solution: N/A<br />

CVE Not available<br />

Samba < 3.0.22 Local File Permissions Credentials Disclosure<br />

<strong>PVS</strong> ID: 3499 FAMILY: Samba RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates log<br />

files.\n\nThe remote Samba server, according to its version number, may be vulnerable to a<br />

local flaw. Specifically, if debugging has been set to level 5 or higher, the local SAMBA<br />

process will log account credentials. These credentials can be read by local users and used<br />

in future attacks.<br />

Solution: Upgrade to version 3.0.22 or higher.<br />

CVE-2006-1059<br />

Policy - Virtual War Gaming Server Detection<br />

<strong>PVS</strong> ID: 3500 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized by corporate<br />

policy.\n\nThe remote server is running the Virtual War Gaming Server. This application is<br />

used to manage game events and profiles.<br />

Solution: Ensure that the software is authorized.<br />

CVE Not available<br />

BASE < 1.2.4 base_maintenance Authentication Bypass<br />

<strong>PVS</strong> ID: 3501 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21174<br />

Description: The remote web server contains a PHP script that is prone to an authentication bypass<br />

vulnerability. The remote host is running BASE, a web-based tool for analyzing alerts from<br />

one or more SNORT sensors. The version of BASE installed on the remote host allows a<br />

remote attacker to bypass authentication to the 'base_maintenance.php' script and then<br />

perform selected maintenance tasks.<br />

Family Internet Services 902

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!