27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote browser may allow an attacker to read confidential<br />

data.\n\nThe installed version of Firefox is reported to be vulnerable to a number of<br />

flaws. The details of the flaws are not currently known; however, it is alleged that an<br />

attacker can bypass security mechanisms in order to obtain local file contents. In<br />

order for this attack to be a success, the attacker would need to be able to convince a<br />

user to browsea malicious URI and expect that the user would allow a popup<br />

window.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-0801<br />

Jetty Non-random Session ID Vulnerability<br />

<strong>PVS</strong> ID: 3904 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running Jetty, a Java web server that can be downloaded<br />

from the Internet and is currently bundled with some IBM applications. This version of<br />

Jetty is vulnerable to a remote flaw within its random number generation. Jetty uses a<br />

predictable algorithm to generate session IDs. Given this, an attacker can gather and<br />

impersonate other accounts with generated session IDs. An attacker exploiting this flaw<br />

would only need to be able to access the Jetty application that utilized Session IDs.<br />

Solution: Upgrade to version 4.2.27, 5.1.12, 6.0.2, 6.1.0-pre3 or higher.<br />

CVE-2006-6969<br />

Samba < 3.0.24 nss_winbind.so.1 Multiple Function Overflow<br />

<strong>PVS</strong> ID: 3905 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Samba<br />

server, according to its version number ('%L'), may be vulnerable to multiple remote buffer<br />

overflows. The flaw appears to be in the way that Samba handles very long responses to<br />

'gethostbyname' and 'getipnodebyname' name resolution. An attacker exploiting this flaw<br />

would only need to be able to send a very long name to the vulnerable application.<br />

Successful exploitation would result in the attacker executing arbitrary code on the Samba<br />

server.<br />

Solution: Upgrade to version 3.0.24 or higher.<br />

CVE-2007-0453<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

AXIGEN Mail Server IMAP Server Multiple Authentication Methods DoS<br />

<strong>PVS</strong> ID: 3906 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:24321<br />

Family Internet Services 1011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!