27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: N/A<br />

CVE Not available<br />

cPanel Remote Backup Information Disclosure<br />

<strong>PVS</strong> ID: 4107 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of cPanel that is either 10.9.1 or 11.4.19.\nThe remote version of this<br />

software is vulnerable to a cross-site scripting (XSS) flaw in the 'scgiwrap' script. An<br />

attacker exploiting this flaw would need to be able to convince a user to browse a malicious<br />

URI. In addition, this version of cPanel is vulnerable to a path disclosure flaw. Successful<br />

exploitation would result in the attacker gaining knowledge of the physical location of the<br />

different web files.<br />

Solution: Upgrade or patch according to vendor recommednations.<br />

CVE-2007-3367<br />

Ubuntu Server Detection<br />

<strong>PVS</strong> ID: 4108 FAMILY: Operating System Detection RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Ubuntu operating system. This information was gathered via<br />

the web server banner that looked like: \n %L<br />

Solution: Upgrade to the latest version of Ubuntu.<br />

CVE Not available<br />

CF<strong>Network</strong> < 129.20 DoS<br />

<strong>PVS</strong> ID: 4109 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running CF<strong>Network</strong> prior to 129.20. CF<strong>Network</strong> is an API for Mac OS X<br />

users that allows an abstraction of common network protocols. This version of CF<strong>Network</strong><br />

is prone to a Denial of Service (DoS) flaw. An attacker exploiting this flaw would be able<br />

to crash the application utilizing CF<strong>Network</strong>. The reported version of CF<strong>Network</strong> is: \n %L<br />

Solution: Upgrade to version 129.20 or higher.<br />

CVE-2007-0464<br />

Limewire Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4110 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1066

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!