27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

via the network.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

Brutus Password Scanning Tool Detection<br />

<strong>PVS</strong> ID: 3807 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote client is running a Brutus scanner. Brutus is a brute-force<br />

scanner that scans servers, routers, applications and more for passwords.<br />

Solution: Ensure that this application is authorized according to corporate policies and guidelines.<br />

CVE Not available<br />

WarFTP Daemon < 1.82.00-RC13 Multiple Command Remote Format Strings<br />

<strong>PVS</strong> ID: 3808 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running WarFTPd, an FTP server for the Microsoft platform. The version of<br />

WarFTPd running on this host contains multiple 'format string' vulnerabilities. An attacker<br />

exploiting these flaws would need to be able to authenticate to the FTP server. After<br />

authentication, the attacker would send a malformed request. Successful exploitation would<br />

allow the attacker to crash the application and possibly execute arbitrary code on the<br />

remote server. The vulnerable commands are 'CWD', 'CDUP', 'DELE', 'NLST', 'LIST' and<br />

'SIZE'.<br />

Solution: Upgrade to version 1.82.00-RC13 or higher.<br />

CVE-2006-5789<br />

Sun-One Application Server Version Detection<br />

<strong>PVS</strong> ID: 3809 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun-One Application Server version %L<br />

Solution: N/A<br />

CVE Not available<br />

SeaMonkey < 1.0.6 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3810 FAMILY: Web Clients RISK: HIGH NESSUS ID:23634<br />

Family Internet Services 985

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!