27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host passes information across the network in an insecure<br />

manner.\n\nThe remote server is managed by a Java JConsole. Further, the server is<br />

configured to accept plaintext credentials. This can be dangerous if an attacker can gain<br />

access to network traffic. The plaintext authentication string observed was:\n%P\n<br />

Solution: Require remote clients to use an encrypted session.<br />

CVE Not available<br />

WordPress < 2.6 press-this.php XSS<br />

<strong>PVS</strong> ID: 4587 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

version of WordPress installed on the remote host is vulnerable to a cross-site scripting<br />

flaw due to the way that it parses user-supplied data to the 'press-this.php' script. An<br />

attacker exploiting this flaw would need to be able to convince a WordPress user to open a<br />

malicious URI. Successful exploitation would result in attacker code being run in the<br />

browser.<br />

Solution: Upgrade to version 2.6 or higher.<br />

CVE Not available<br />

Firefox < 2.0.0.16 / 3.0.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4588 FAMILY: Web Clients RISK: HIGH NESSUS ID:33505<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues :\n\n - By creating a very large number of references to a common CSS object, an<br />

attacker can overflow the CSS reference counter, causing a crash when the browser<br />

attempts to free the CSS object while still in use and allowing for arbitrary code execution<br />

(MFSA 2008-34).\n - If Firefox is not already running, passing it a command-line URI with<br />

pipe ('|') symbols will open multiple tabs, which could be used to launch 'chrome:i' URIs<br />

from the command-line or to pass URIs to Firefox that would normally be handled by a<br />

vector application (MFSA 2008-35).<br />

Solution: Upgrade to version 2.0.0.16 / 3.0.1 or higher.<br />

CVE-2008-2933<br />

Blackberry Enterprise Server Version Detection<br />

<strong>PVS</strong> ID: 4589 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Blackberry Enterprise Server version: \n %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1200

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!