27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

French administration in 2002 and the development of SSF has been discontinued. SSF is<br />

based upon an old version of OpenSSH and it implements an old version of the protocol.<br />

As it is no longer maintained, it might be vulnerable to dangerous flaws.<br />

Solution: Remove SSF and install an up-to-date version of OpenSSH.<br />

CVE Not available<br />

Informix Dynamic Server Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 4423 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Informix database server version '%L'.\nThis version of Informix is reported<br />

to be vulnerable to a number of remote flaws. While the details of the flaw are currently<br />

unknown, it is believed that a successful attack would result in the attacker overflowing a<br />

memory buffer and either executing arbitrary code or crashing the service.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0949<br />

IBM WebSphere Application Server < 6.1.0.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4424 FAMILY: Web Servers RISK: HIGH NESSUS ID:45422<br />

Description: Synopsis :\n\nThe remote application server is affected by multiple vulnerabilities.\n\nIBM<br />

WebSphere Application Server 6.1 before Fix Pack 15 appears to be running on the remote<br />

host. Such versions are reportedly affected by the following vulnerabilities :\n\n - There is<br />

an unspecified security exposure in wsadmin (PK45726).\n\n - Sensitive information might<br />

appear in clear text in the http_plugin.log file (PK48785).\n\n - There is an unspecified<br />

potential security exposure in the 'PropFilePasswordEncoder' utility (PK52709).\n\n - There<br />

is an unspecified potential security exposure with 'serveServletsByClassnameEnabled'<br />

(PK52059).\n\n - Sensitive information may appear in plain text in startserver.log<br />

(PK53198).<br />

Solution: Apply Fix Pack 15 (6.1.0.15) or higher.<br />

CVE Not available<br />

Apple iPhone < 1.1.4 Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4425 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is an Apple iPhone. This version of iPhone is vulnerable to a flaw in the way<br />

that the Safari browser handles memory. Specifically, when all memory has been utilized<br />

by the browser, it will attempt to close all inactive documents. In the process of closing<br />

these documents, a kernel panic and ensuing crash occurs. An attacker exploiting this flaw<br />

would need to be able to entice an iPhone user to browse to a malicious web server.<br />

Successful exploitation would result in the device crashing.<br />

Family Internet Services 1154

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!