PCI DSS compliance

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote host has been found to be NOT COMPLIANT with the PCI DSS
requirements.

Description :

The remote host is vulnerable to one or more conditions that are
considered to be 'automatic failures' according to the PCI DSS
Approved Scanning Vendors Program Guide (Version 2.0). These failures
include one or more of the following :

- Vulnerabilities with a CVSS base score greater than or
equal to 4.0

- Unsupported operating systems

- Internet reachable database servers (must validate whether
cardholder data is stored)

- Presence of built-in or default accounts

- Unrestricted DNS Zone transfers

- Unvalidated parameters leading to SQL injection attacks

- Cross-Site Scripting (XSS) flaws

- Directory Traversal Vulnerabilities

- HTTP response splitting/header injection

- Detection of backdoor applications (malware, trojan horses,
rootkits, backdoors)

- Use of older, insecure SSL/TLS versions (SSL v3.0/TLS v1.0 is the
minimum standard)

Details of the failed items may be found in the 'Output' section of
this plugin result. These vulnerabilities and/or failure conditions
will have to be corrected before you are able to submit your scan
results for validation by Tenable to meet your quarterly external
scanning requirements.

If you are conducting this scan via Nessus Enterprise Cloud and either
disagree with any of the results, believe there are false-positives,
or must rely on compensating controls to mitigate the vulnerability
you may proceed with submitting this report to our PCI portal by
clicking on 'Submit for PCI Validation'. You may login to the Tenable
PCI portal using your Nessus Enterprise Cloud credentials and dispute
or provide mitigation evidence for each of the residual findings.

See also :

http://www.pcisecuritystandards.org/
https://discussions.nessus.org/community/pci

Risk factor :

High

Family: Policy Compliance

Nessus Plugin ID: 33929 ()

Bugtraq ID:

CVE ID: