27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

JBoss EAP < 4.2.0.CP04 / 4.3.0.CP02 Status Servlet Information Disclosure<br />

<strong>PVS</strong> ID: 4689 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe version of JBoss Enterprise Application Platform (EAP)<br />

running on the remote host allows attackers to download '.class' files. These files can be<br />

easily decompiled using a tool such as 'jad'. The attacker would then have access to the<br />

source code which could lead to more sophisticated attacks. The reported version of JBOSS<br />

is: \n %L<br />

Solution: Upgrade to version 4.2.0.CP04, 4.3.0.CP02 or higher.<br />

CVE-2008-3519<br />

PHP iCalendar < 2.25 Administrative Bypass<br />

<strong>PVS</strong> ID: 4690 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running PHP iCalendar, an<br />

open-source PHP blog. This version of iCalendar is vulnerable to a flaw where<br />

a remote user can, by manually changing their cookie, gain administrative<br />

access to the application. The reported version of PHP iCalendar is: \n %L \n<br />

Solution: When available, upgrade to version 2.25 or higher.<br />

CVE-2006-1292<br />

Firefox < 3.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4691 FAMILY: Web Clients RISK: HIGH NESSUS ID:34267<br />

Description: Synopsis : \n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox is affected by various security<br />

issues : \n\n- An attacker can cause the content window to move while the mouse is being<br />

clicked, causing an item to be dragged rather than clicked-on (MFSA 2008-40).\n -<br />

Privilege escalation is possible via 'XPCnativeWrapper' pollution (MFSA 2008-41).\n -<br />

There are several stability bugs in the browser engine that may lead to crashes with<br />

evidence of memory corruption (MFSA 2008-42).\n - Certain BOM characters and low<br />

surrogate characters, if HTML-escaped, are stripped from JavaScript code before it is<br />

executed, which could allow for cross-site scripting attacks (MFSA 2008-43).\n - The<br />

'resource: ' protocol allows directory traversal on Linux when using URL-encoded slashes,<br />

and it can by used to bypass restrictions on local HTML files (MFSA 2008-44).\nThe<br />

reported browser version was: \n %L<br />

Solution: Upgrade to version 3.0.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1231

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!