27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote HTTP proxy server is prone to a buffer overflow attack.\n\nThe<br />

remote host appears to be running WinGate Proxy Server, a Windows application for<br />

managing and securing Internet access. According to its banner, the version of WinGate<br />

installed on the remote host is affected by a buffer overflow vulnerability in its HTTP<br />

proxy service. An attacker with access to use the proxy may be able to exploit this issue to<br />

execute arbitrary code on the remote host. By default, the service operates with LOCAL<br />

SYSTEM privileges, which means that a successful attack may result in a complete<br />

compromise of the affected system.<br />

Solution: Upgrade to version 6.1.3 or higher.<br />

CVE-2006-2926<br />

'The Bat' Mass Mailer Detection<br />

<strong>PVS</strong> ID: 3643 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running 'The Bat', a piece of software that is used to automate the<br />

sending of many emails. The presence of 'The Bat' often indicates the existence of a<br />

spamming mail server.<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Dynamic DNS Dynamic Update Client (DUC) Detection<br />

<strong>PVS</strong> ID: 3644 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is configured as a dynamic DNS server. Further, it is using software that<br />

automatically queries and updates an Internet DNS database whenever a new client IP<br />

address is obtained. This sort of software is often used by individuals who are connected to<br />

the Internet via a Dynamic (DHCP) IP address.<br />

Solution: Ensure that this dynamic domain name is being used in compliance with corporate<br />

standards and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

TIBCO < 7.5.1 Rendezvous HTTP Administrative Interface Remote Overflow<br />

<strong>PVS</strong> ID: 3645 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the TIBCO Rendezvous web server. Rendezvous is part of the TIBCO messaging<br />

suite that facilitates network-based communication. This version of Rendezvous ( %L ) is<br />

vulnerable to a remote buffer overflow. An attacker exploiting this flaw would be able to<br />

execute arbitrary code on the remote Rendezvous server.<br />

Family Internet Services 940

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!