27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

OpenSSL < 0.9.8f Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4221 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of OpenSSL that is older than 0.9.7n or 0.9.8f. There are several bugs in<br />

this version of OpenSSL that may allow an attacker to either execute remote code or cause<br />

a Denial of Service (DoS).<br />

Solution: Upgrade to version 0.9.8f or higher.<br />

CVE-2007-5135<br />

BrightStore HSM CsAgent Version Detection<br />

<strong>PVS</strong> ID: 4222 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the BrightStore HSM CsAgent version %L<br />

Solution: Ensure that you are running the latest version of CsAgent.<br />

CVE Not available<br />

DriveLock Agent Version Detection<br />

<strong>PVS</strong> ID: 4223 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: DriveLock is a software security product that can control physical access to computer<br />

resources. The remote host is running the DriveLock agent version %L<br />

Solution: Ensure that you are running the latest version of DriveLock.<br />

CVE Not available<br />

DriveLock < 5.0.0.314 Agent Version Detection<br />

<strong>PVS</strong> ID: 4224 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nDriveLock is a<br />

software security product that can control physical access to computer resources. The<br />

remote host is running the DriveLock agent version %L\nThis version of DriveLock is<br />

vulnerable to a remote buffer overflow. An attacker exploiting this flaw would only need to<br />

be able to send a very long string to the HTTP server listening on port 6061. Successful<br />

exploitation would result in the attacker executing arbitrary code on the remote machine.<br />

Solution: Upgrade to version 5.0.0.314 or higher.<br />

CVE-2007-5209<br />

HTTP Server Basic Authentication Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1098

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!