27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote web server is hosting .ini files. As an example, consider the following<br />

file %P\nThe webmaster should make sure that they do not contain confidential data.<br />

Solution: N/A<br />

CVE Not available<br />

Dovecot ManageSieve Server Detection<br />

<strong>PVS</strong> ID: 4782 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Dovecot mail server with the Dovecot ManageSieve<br />

management application.<br />

Solution: N/A<br />

CVE Not available<br />

IBM WebSphere Application Server 7.0 < Fix Pack 1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4783 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35082<br />

Description: Synopsis : \n\nThe remote application server is affected by multiple vulnerabilities.\n\nIBM<br />

WebSphere Application Server 7.0 before Fix Pack 1 appears to be running on the remote<br />

host. Such versions are reportedly affected by multiple vulnerabilities.\n\n - A vulnerability<br />

in feature pack for web services could lead to information disclosure due to<br />

'userNameToken' (PK67282).\n\n - A user locked by the underlying OS may be able to<br />

authenticate via the administrative console (PK67909).\n\n - Web authentication options<br />

'Authenticate when any URI is accessed' and 'Use available authentication data when an<br />

unprotected URI is accessed' are ignored. Servlets with no security constraints are not<br />

authenticated and usernames with the '@' symbol fail to authenticate (PK71826).\n\n -<br />

WS-<strong>Security</strong> in JAX-WS does not remove UsernameTokens from client cache on failed<br />

logins (PK72435).\n\n - SSL traffic is routed over unencrypted TCP routes (PK74777). The<br />

reported version is: \n %L<br />

Solution: Apply Fix Pack 1 (7.0.0.1) or higher.<br />

CVE-2008-5414<br />

PHP < 5.2.8 magic_quotes_gpc <strong>Security</strong> Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4784 FAMILY: Web Servers RISK: HIGH NESSUS ID:35067<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by a security<br />

bypass weakness.\n\nAccording to its banner, the version of PHP installed on the remote<br />

host is 5.2.7. This version introduced a regression with regard to 'magic_quotes'<br />

functionality due to an incorrect fix to the filter extension. As a result, the<br />

'magic_quotes_gpc' setting remains off even if it is set to on. The reported version of PHP<br />

is: \n %L<br />

Family Internet Services 1260

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!