27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 10.4.11 or higher.<br />

CVE-2007-4701<br />

Samba < 3.0.27 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4285 FAMILY: Samba RISK: HIGH NESSUS ID:28228<br />

Description: Synopsis :\n\nThe remote Samba server may be affected one or more vulnerabilities.\n\n<br />

According to its banner, the version of the Samba server ('%L') on the remote host contains<br />

a boundary error in the 'reply_netbios_packet()' function in 'nmbd/nmbd_packets.c' when<br />

sending NetBIOS replies. Provided the server is configured to run as a WINS server, a<br />

remote attacker can exploit this issue by sending multiple specially-crafted WINS 'Name<br />

Registration' requests followed by a WINS 'Name Query' request, leading to a stack-based<br />

buffer overflow and allow for execution of arbitrary code.\nThere is also a stack buffer<br />

overflow in nmbd's logon request processing code that can be triggered by means of<br />

specially-crafted GETDC mailslot requests when the affected server is configured as a<br />

Primary or Backup Domain Controller. The Samba security team currently does not believe<br />

this particular vulnerability can be exploited to execute arbitrary code remotely.<br />

Solution: Upgrade to version 3.0.27 or later.<br />

CVE-2007-5398<br />

WebSphere HTML 'Expect' Header HTML Injection<br />

<strong>PVS</strong> ID: 4286 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

WebSphere server is running version '%L'.\nThis version is reported to be vulnerable to an<br />

HTML injection flaw. An attacker exploiting this flaw would need to create a custom<br />

request that utilized custom 'Expect' headers and be able to convince unsuspecting users to<br />

launch the URI. Successful exploitation would result in an attacker gaining access to<br />

confidential client data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-5944<br />

VMWare Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4287 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running VMWare server, an application that allows users to run multiple<br />

operating systems virtually. Further, this instance of VMWare is a server application that<br />

allows remote administrator access to the VMWare console. The displayed banner is '%L'<br />

Solution: Only allow administrative VMWare connections from trusted hosts.<br />

Family Internet Services 1115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!