27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

using it in a database query. An unauthenticated remote attacker may be able to leverage<br />

this flaw to manipulate SQL queries and bypass authentication, uncover sensitive<br />

information, modify data, or launch attacks against the underlying database.\n\n Note that<br />

successful exploitation of this issue requires that PHP's 'magic_quotes_gpc' be disabled.<br />

Solution: Upgrade to version 2.1 alpha 5 or higher.<br />

CVE-2007-1193<br />

Dropbear < 0.49 Hostkey Host Spoofing Vulnerability<br />

<strong>PVS</strong> ID: 3929 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that would allow remote attackers to<br />

spoof trusted hosts.\n\nThe remote host is running Dropbear, a small, open-source SSH<br />

server. The version of Dropbear installed on the remote host by default has a flaw where<br />

the application fails to warn if the hostkey file has changed. An attacker exploiting this flaw<br />

would be able to execute a man-in-the-middle attack against the Dropbear server.<br />

Solution: Upgrade to version 0.49 or higher.<br />

CVE-2007-1099<br />

Qualys Scanner Detection<br />

<strong>PVS</strong> ID: 3930 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running the Qualys network scanner. The presence<br />

of this software indicates that a group is scanning the network for vulnerabilities.<br />

Solution: Ensure that this software is authorized for your network.<br />

CVE Not available<br />

Mozilla Thunderbird < 1.5.0.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3931 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:24748<br />

Description: Synopsis :\n\nThe remote Windows host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\n The remote version of Mozilla Thunderbird suffers from various<br />

security issues, at least one of which may lead to execution of arbitrary code on the affected<br />

host subject to the user's privileges.<br />

Solution: Upgrade to version 1.5.0.10 or higher.<br />

CVE-2007-0777<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache TomCat mod_jk < 1.2.21 Worker Map Remote Overflow<br />

<strong>PVS</strong> ID: 3932 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1018

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!