27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

arbitrary code into a chrome document and then execute it with chrome privileges if he can<br />

trick a user into downloading a malicious HTML file and a .desktop shortcut file. (MFSA<br />

2009-04)\n\n - Cookies marked HTTPOnly are readable by JavaScript via the<br />

'XMLHttpRequest.getResponseHeader' and 'XMLHttpRequest.getAllResponseHeaders'<br />

APIs. (MFSA 2009-05)\n\n - The 'Cache-Control: no-store' and 'Cache-Control: no-cache'<br />

HTTP directives for HTTPS pages are ignored by Firefox 3, which could lead to exposure<br />

of sensitive information. (MFSA 2009-06).\n\nThe reported version of Firefox is: \n %L<br />

Solution: Upgrade to version 3.0.6 or higher.<br />

CVE-2009-0358<br />

Squid < 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 HTTP Version Numbers DoS<br />

<strong>PVS</strong> ID: 4923 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35620<br />

Description: Synopsis : \n\nThe remote proxy server is susceptible to a denial of service attack.\n\nThe<br />

version of the Squid proxy caching server installed on the remote host may abort when<br />

parsing requests with an invalid HTTP version. A remote attacker may be able to leverage<br />

this issue to crash the application, thereby denying service to legitimate users.\n\nNote that<br />

successful exploitation of this issue requires that Squid was not built with the 'NODEBUG'<br />

define.\nThe reported version of Squid is: \n %L<br />

Solution: Either apply the appropriate patches referenced in the project's advisory above or upgrade<br />

to version 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 or higher.<br />

CVE-2009-0478<br />

Moodle < 1.9.4 / 1.8.8 / 1.7.7 / 1.6.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4924 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

Moodle installed on the remote host is vulnerable to a number of flaws. First, the server is<br />

vulnerable to a cross-site scripting (XSS) flaw. An attacker exploiting this flaw would be<br />

able to execute arbitrary code within the browser of unsuspecting users. The remote host is<br />

vulnerable to a cross-site request forgery (CSRF) flaw that could allow remote users to<br />

execute commands on the behalf of logged in users. Finally, there are several 'information<br />

disclosure' flaws that may allow an attacker the ability to gain access to confidential data.<br />

The reported version of Moodle is: \n %L \n<br />

Solution: Upgrade to version 1.6.9, 1.7.7, 1.8.8, 1.9.4 or higher.<br />

CVE Not available<br />

Openfire < 3.6.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4925 FAMILY: CGI NESSUS ID:35628<br />

Family Internet Services 1299

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!