27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-4761<br />

SNMP 'cable-docsis' Community String<br />

<strong>PVS</strong> ID: 3749 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv1 server that uses a well-known<br />

community string - 'cable-docsis'<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks, your community string<br />

is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

SNMP 'cable-docsis' Community String<br />

<strong>PVS</strong> ID: 3750 FAMILY: SNMP Traps RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running an SNMPv2 server that uses a well-known<br />

community string - 'cable-docsis'<br />

Solution: This signature was obtained through direct sniffing of the network, so if possible, migrating<br />

systems to SNMP v3 would be more secure. For non-local attacks, your community string<br />

is easily guessed and should be changed to something more random.<br />

CVE Not available<br />

OpenSSH < 4.4 Multiple GSSAPI Vulnerabilities<br />

<strong>PVS</strong> ID: 3751 FAMILY: SSH RISK: HIGH NESSUS ID:22466<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of OpenSSH that is vulnerable to a flaw in the way that it<br />

handles GSSAPI authentication. If the SSH server is configured to utilize GSSAPI<br />

authentication then the host may be compromised by a remote attacker with access to the<br />

SSH port (typically 22). Successful exploitation would result in a Denial of Service (i.e.<br />

loss of availability). The version of SSH is: \n %L<br />

Solution: Upgrade to version 4.4 or higher.<br />

CVE-2006-5051<br />

SAP Internet Transaction Server (ITS) Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3752 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 969

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!