Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> Unprotected PC Anywhere Service


Vulnerability Assessment Details

Unprotected PC Anywhere Service

Vulnerability Assessment Summary
Unprotected PC Anywhere Service

Detailed Explanation for this Vulnerability Assessment

The PC Anywhere service does not require a password to access
the desktop of this system. If this machine is running Windows 95,
98, or ME, gaining full control of the machine is trivial. If
this system is running NT or 2000 and is currently logged out, an
attacker can still spy on and hijack a legitimate user's session when
they login.

Solution:
1. Open the PC Anywhere application as an Administrator.
2. Right click on the Host object you are using and select Properties.
3. Select the Caller Access tab.
4. Switch the authentication type to Windows or PC Anywhere.
5. If you are using PC Anywhere authentication, set a strong password.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Digital Defense Incorporated

Cables, Connectors

100% test NI PCI-7344 (by DHL or EMS) #DZY
$427.0
100% test NI PCI-7344 (by DHL or EMS) #DZY pictureAsus Z170 Pro Gaming Motherboard Intel LGA 1151
$89.99
Asus Z170 Pro Gaming Motherboard Intel LGA 1151 pictureASUS P5Q PRO Motherboard, Intel E8400 Core 2 Duo 3.0GHz, 4GB Corsair RAM - Combo
$99.0
ASUS P5Q PRO Motherboard, Intel E8400 Core 2 Duo 3.0GHz, 4GB Corsair RAM - Combo picture100% test sangoma A103 (by DHL or EMS) #DZY
$369.0
100% test sangoma A103 (by DHL or EMS) #DZY picture


Discussions

No Discussions have been posted on this vulnerability.