Synopsis
The remote host is running software which should be authorized by corporate policy.
Description
A SETI@HOME client appears to be running on this port. This program may be used by malicious users to get your system information (processor type and the operating system). SETI@HOME client versions prior to 3.08 are vulnerable to a buffer overflow attack.
Solution
Uninstall the program if it is not necessary.
Plugin Details
Reference Information
BID: 7281