27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Ensure that such services are authorized.<br />

CVE Not available<br />

Safari < 3.2.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4932 FAMILY: Web Clients RISK: HIGH NESSUS ID:35687<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Safari installed on the remote Windows host is earlier than 3.2.2.<br />

Such versions reportedly have multiple vulnerabilities : \n\n - Multiple input validation<br />

issues in their handling of 'feed: ' URLs, which could be abused to execute arbitrary<br />

JavaScript code in the local security zone. (CVE-2009-0137)\n\n - A cached certificate is<br />

not required before displaying a lock icon for a HTTPS web site. This allows a<br />

man-in-the-middle attacker to present the user with spoofed web pages over HTTPS that<br />

appear to be from a legitimate source. (CVE-2009-2072)\n\n - The browser processes a<br />

3xxx HTTP CONNECT before a successful SSL handshake, which could allow a<br />

man-in-the-midddle attacker to execute arbitrary script code in the context of a HTTPS site.<br />

(CVE-2009-2062)\n\nThe reported version of Safari is: \n %L<br />

Solution: Upgrade to version 3.2.2 or higher.<br />

CVE-2009-2072<br />

Media Gateway Control Protocol (MGCP) Client Detection<br />

<strong>PVS</strong> ID: 4933 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Media Gateway Control Protocol (MGCP) client. An MGCP client is<br />

used to create sessions with an MGCP server. In particular, it is commonly used with<br />

Voice-Over-IP (VoIP) services.<br />

Solution: Ensure that such services are authorized.<br />

CVE Not available<br />

Sun Java System Directory Server 6.x < 6.3.1 LDAP JDBC Backend DoS<br />

<strong>PVS</strong> ID: 4934 FAMILY: Generic RISK: HIGH NESSUS ID:35688<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Sun Java System Directory Server, an LDAP server from Sun<br />

Microsystems. The reported version number was: \n %L \n\n The installed version is older<br />

than 6.3.1, and the proxy server included with such versions is reportedly affected by a<br />

denial of service vulnerability. By sending a specially crafted request to the JDBC backend<br />

through the proxy server, an unauthenticated remote attacker may be able to trigger a denial<br />

of service condition.<br />

Solution: Upgrade to version 6.3.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1302

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!