27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Apache Tomcat web server with mod_jk. mod_jk is reported to be vulnerable<br />

to a remote buffer overflow. It is alleged that an attacker sending a URI of greater than<br />

4095 bytes can corrupt the application memory. Successful exploitation would result in the<br />

attacker executing arbitrary code on the remote web server.<br />

Solution: Upgrade to version 1.2.21 or higher.<br />

CVE-2007-0774<br />

WordPress < 2.1.2 Backdoor Vulnerability<br />

<strong>PVS</strong> ID: 3933 FAMILY: CGI RISK: HIGH NESSUS ID:24759<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by a<br />

remote command execution vulnerability.\n\nThe version of WordPress installed on the<br />

remote host may include a backdoor that allows an unauthenticated remote attacker to<br />

execute arbitrary code on the remote host, subject to the permissions of the web server user<br />

ID.<br />

Solution: Upgrade to WordPress version 2.1.2 or higher and overwrite all the old files, especially<br />

those in wp-includes.<br />

CVE-2007-1277<br />

Anomalous FTP Server Detection<br />

<strong>PVS</strong> ID: 3934 FAMILY: FTP Servers RISK: NONE NESSUS ID:Not Available<br />

Description: An FTP server is running on this port. The server is running on a non-standard port. The<br />

last observed user ID was\n%P<br />

Solution: N/A<br />

CVE Not available<br />

QuickTime < 7.1.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3935 FAMILY: Web Clients RISK: HIGH NESSUS ID:24761<br />

Description: Synopsis :\n\nThe remote Windows host contains an application that is prone to multiple<br />

attacks.\n\nAccording to its version, the installation of QuickTime on the remote Windows<br />

host is affected by multiple buffer overflows. An attacker may be able to leverage these<br />

issues to crash the affected application or to execute arbitrary code on the remote host by<br />

sending a specially-crafted file to a victim and having him open it using QuickTime.<br />

Solution: Upgrade to version 7.1.5 or higher.<br />

CVE-2007-0717<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1019

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!