27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

executable files downloaded from a site if that site is in an IE7 zone with 'Launching<br />

applications and unsafe files' set to 'Enable' or an IE6 'Local intranet ' / ' Trusted sites' zone<br />

(CVE-2008-2306).\n - There is a memory corruption issue in WebKit's handling of<br />

JavaScript arrays that could be leveraged to crash the application or execute arbitrary code<br />

if visiting a malicious site (CVE-2008-2307).\n - When handling an object with an<br />

unrecognized content type, Safari does not prompt the user before downloading the object<br />

(aka, the 'carpet-bombing' issue). If the download location is the Windows Desktop (the<br />

default), this could lead to arbitrary code execution (CVE-2008-2540).\nIAVT Reference :<br />

2009-T-0021\nSTIG Finding Severity : Category II<br />

Solution: Update to version 3.1.2 or higher.<br />

DC++ Client Detection<br />

CVE-2008-2540<br />

<strong>PVS</strong> ID: 4557 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running DC++, an open source peer-to-peer client. The reported version<br />

is: \n %L<br />

Solution: Ensure that this application is authorized according to corporate policy.<br />

CVE Not available<br />

Kismet Server Information Disclosure<br />

<strong>PVS</strong> ID: 4558 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33257<br />

Description: Synopsis :\n\nIt is possible to collect information from the remote wireless monitoring<br />

service.\n\nThe remote host is running a Kismet server and allows clients to use it to<br />

monitor wireless activity. An anonymous attacker may use the information collected to<br />

enumerate a network.<br />

Solution: Limit incoming traffic to this port if and, if appropriate, do not allow clients to list WEP<br />

keys.<br />

CVE Not available<br />

WebGUI < 7.5.13 RSS Feed Authentication Bypass<br />

<strong>PVS</strong> ID: 4559 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to a flaw in the way that it handles access<br />

to data. Protected data can be accessed by requesting the data within an RSS feed. An<br />

attacker exploiting this flaw would only need the ability to request an RSS subscription.<br />

Family Internet Services 1191

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!