27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Attachmate Reflection for Secure IT UNIX Server < 7.0 SP1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4632 FAMILY: SSH RISK: HIGH NESSUS ID:33948<br />

Description: Synopsis : \n\nThe remote SSH service is affected by multiple vulnerabilities.\n\nThe<br />

version of Attachmate Reflection for Secure IT UNIX Server installed on the remote host is<br />

lower than 7.0 SP1 and thus reportedly affected by several issues : \n\n - There is an<br />

inherited vulnerability in OpenSSL when parsing malformed ASN.1 structures leading to a<br />

denial of service vulnerability (CVE-2006-2937).\n - There is an inherited vulnerability in<br />

OpenSSL when parsing parasitic public keys leading to a denial of service vulnerability<br />

(CVE-2006-2940).\n - There is an inherited vulnerability in OpenSSL when performing<br />

Montgomery multiplication, leading to a side-channel attack vulnerability<br />

(CVE-2007-3108).\n - There is an inherited vulnerability in OpenSSH with the execution of<br />

the ~/.ssh2/rc session file (CVE-2008-1657).\n - There is an issue with the security of<br />

forwarded X11 connections, leading to possible hijacking. (CVE-2008-1483)\n - There are<br />

multiple unspecified other vulnerabilities.\nThe reported version of SSH is: \n %L<br />

Solution: Upgrade to version 7.0 SP1 or higher.<br />

CVE-2008-6021<br />

Cisco Secure Access Control Server Detection<br />

<strong>PVS</strong> ID: 4633 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is part of an access policy control platform.\n\nThe<br />

remote host appears to be running Cisco Secure Access Control Server, an access policy<br />

control platform, on this port. It is used to centrally manage access to network resources.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

Opera < 9.52 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4634 FAMILY: Web Clients RISK: HIGH NESSUS ID:33949<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is older than 9.52 and is<br />

reportedly affected by several issues :\n\n - Specially-crafted URLs could start Opera in a<br />

way that would allow execution of arbitrary code.\n - Invalid checking of what frames a<br />

site can change, allowing a website to open pages from other sites.\n - An unspecified<br />

cross-site scripting issue.\n - Custom shortcuts and menu commands may pass parameters<br />

created from uninitialized memory.\n - Secure sites loading insecure content in a frame will<br />

cause Opera to incorrectly display the padlock icon.\n - Feed sources can link to a user's<br />

local disk, and appropriate JavaScript can detect if these files exist or not.\n - The page<br />

address may be changed when a user subscribes to a newsfeed subscription using the feed<br />

subscription button.<br />

Solution: Upgrade to version 9.52 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1214

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!