27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 7.4.1 or higher.<br />

CVE-2008-0760<br />

SeaMonkey < 1.1.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4298 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected<br />

by multiple vulnerabilities.\n\n The installed version of SeaMonkey is affected by<br />

various security issues :\n\n - Three bugs that can result in crashes with traces of<br />

memory corruption\n - A cross-site scripting vulnerability involving support for<br />

the 'jar:' URI scheme\n - A timing issue when setting the 'window.location'<br />

property that could be leveraged to conduct cross-site request forgery attacks.<br />

Solution: Upgrade to version 1.1.7 or higher.<br />

CVE-2007-5960<br />

Ruby on Rails < 1.2.6 Cookie Related Session Fixation<br />

<strong>PVS</strong> ID: 4299 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote server can be used to attack user authentication data.\n\nThe<br />

remote server is running the Ruby on Rails web application. The reported version is<br />

'%L'\nThis version of Rails is reported to be vulnerable to a flaw in the way that it handles<br />

authentication data. Allegedly, the 'lib/action_controller/cgi_process.rb' script is vulnerable<br />

to a flaw that would allow an attacker to steal cookie data. An attacker could then use this<br />

data to gain access to the application with the user's credentials.<br />

Solution: Upgrade to version 1.2.6 or higher.<br />

CVE-2007-6077<br />

IBM Director Version Detection<br />

<strong>PVS</strong> ID: 4300 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running IBM Director version: %L<br />

Solution: N/A<br />

IBM Director <<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4301 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1119

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!