27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2006-5705<br />

SQLYog MySQL HTTP Tunnel Detection<br />

<strong>PVS</strong> ID: 3804 FAMILY: Backdoors<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running a MySQL database. In addition, a PHP script is<br />

installed that allows MySQL connections to be tunneled over HTTP. This sort of<br />

connection is typically utilized when the database administrator does not have access to<br />

connect to the database from remote locations. The tunnel does not use any sort of<br />

encryption and exposes credentials to passive sniffing. In addition, as the PHP script<br />

connects to the database from the localhost, database authentication does not look for the<br />

originating IP address within the GRANT tables but instead uses the server IP as the<br />

originating source. Not only does the script allow database admins to bypass firewall<br />

restrictions and log in insecurely, it also exposes the database to brute-force attacks from<br />

anonymous users. The database information contained within the client request was:\n%P\n<br />

Solution: For remote database administration, choose a method of connection that is restricted to only<br />

trusted sources and encrypts the authentication credentials.<br />

CVE Not available<br />

MetaSploit Server Detection<br />

<strong>PVS</strong> ID: 3805 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy\n\nThe remote server is running a MetaSploit Framework server.<br />

Metasploit allows users to automatically exploit and backdoor vulnerable applications via<br />

the network.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

MetaSploit Server Detection<br />

<strong>PVS</strong> ID: 3806 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server was just observed making an SSL connection to<br />

metasploit.com. An SSL connection to metasploit.com usually indicates a Metasploit server<br />

that is downloading updates from the metasploit.com web site. Metasploit is an attack<br />

framework that allows users to automatically exploit and backdoor vulnerable applications<br />

Family Internet Services 984

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!