27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running SAMI FTP server. It has been reported that this version of SAMI is vulnerable to a<br />

buffer overflow in the way that it handles USER and PASSWORD information. An<br />

attacker exploiting this flaw would be able to execute arbitrary code on the remote SAMI<br />

FTP server.<br />

Solution: No solution is known at this time.<br />

CVE-2006-2212<br />

AWStats < 6.6 migrate Variable Command Execution<br />

<strong>PVS</strong> ID: 3536 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running AWStats, a CGI log analyzer. There are various<br />

content-parsing flaws in the remote version of this software that would allow an attacker to<br />

execute code on the remote host. An attacker exploiting this flaw would only need to be<br />

able to generate HTTP requests to the awstats.pl CGI script. A successful attack would<br />

allow the attacker to run system commands with the privileges of the CGI script.<br />

Solution: Upgrade to version 6.6 or higher.<br />

CVE-2006-2237<br />

Distributed <strong>Network</strong> Protocol v3 Client Detection (SCADA)<br />

<strong>PVS</strong> ID: 3552 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running the Distributed <strong>Network</strong> Protocol v3 client. This<br />

protocol is common on SCADA networks and should be protected or segmented from<br />

the production network.<br />

Solution: N/A<br />

CVE Not available<br />

Distributed <strong>Network</strong> Protocol v3 Server Detection<br />

<strong>PVS</strong> ID: 3553 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running the Distributed <strong>Network</strong> Protocol v3 server. This<br />

protocol is common on SCADA networks and should be protected or segmented from<br />

the production network.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 913

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!