27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Use ACLs to ensure that only trusted administrators can access the administrative GUI.<br />

CVE Not available<br />

Skype Technologies < 1.5.0.80 NSRRunAlertPanel Function Format String (Mac OS X)<br />

<strong>PVS</strong> ID: 3772 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote format string flaw.\n\nThe remote<br />

host is using Skype, a peer to peer chat and VoIP software. The remote version of this<br />

software contains a format string flaw. An attacker exploiting this flaw would need to be<br />

able to convince a user to open a malicious URI that was handled by the Skype software.<br />

Successful exploitation would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 1.5.0.80 or higher.<br />

CVE-2006-5084<br />

Mac OS X Generic Detection<br />

<strong>PVS</strong> ID: 3773 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Mac OS X.<br />

Solution: N/A<br />

CVE Not available<br />

Encryption Private Key Detection (Generic)<br />

<strong>PVS</strong> ID: 3774 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Solution: Ensure that there are policies and guidelines in place that prohibit the passing of<br />

private encryption data in plaintext.<br />

CVE Not available<br />

Encryption Private Key Detection (Generic)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3775 FAMILY: Data Leakage RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote host has just passed an encryption private key via plaintext on the<br />

network. This is a risk in that private keys should only reside on a local system and if they<br />

must be passed, they should be encrypted in transit.<br />

Family Internet Services 975

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!