27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 6.0.2 before Fix Pack 33 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple vulnerabilities :\n\n - Provided an attacker has<br />

valid credentials, it may be possible to hijack an authenticated session. (PK66676)\n\n -<br />

The PerfServlet code writes sensitive information in the 'systemout.log' and ffdc files,<br />

provided Performance Monitoring Infrastructure (PMI) is enabled. (PK63886)\n\n - It may<br />

be possible to login to the administrative console using a user account that is locked by the<br />

operating system. (PK67909)\n\n - An unknown vulnerability affects z/OS-based IBM<br />

WebSphere application servers. (PK71143)\n\n - An unspecified vulnerability in the<br />

administrative console could allow arbitrary file retrieval from the remote system.<br />

(PK72036)\n\n - If APAR PK41002 has been applied, an unspecified vulnerability in<br />

JAX-RPC WS-<strong>Security</strong> component could incorrectly validate 'UsernameToken'.<br />

(PK75992)\n\n - Certain files associated with interim fixes for Unix-based versions of IBM<br />

WebSphere Application Server are built with insecure file permissions. (PK78960)\n\nThe<br />

reported version of WebSphere is: %L\n<br />

Solution: Apply Fix Pack 33 (6.0.2.33) or higher.<br />

CVE-2009-0506<br />

IBM WebSphere Application Server 7.0 < Fix Pack 3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4991 FAMILY: Web Servers RISK: HIGH NESSUS ID:36133<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nIBM WebSphere<br />

Application Server 7.0 before Fix Pack 3 appears to be running on the remote host. Such<br />

versions are reportedly affected by multiple vulnerabilities.\n\n - Under certain conditions it<br />

may be possible to access administrative console user sessions. (PK74966)\n\n - The<br />

adminitrative console is affected by a cross-site scripting vulnerability. (PK77505)\n\n - If<br />

APAR PK41002 has been applied, an unspecified vulnerability in JAX-RPC WS-<strong>Security</strong><br />

component could incorrectly validate 'UsernameToken'. (PK75992)\n\n - Sample<br />

applications shipped with IBM WebSphere Application Server are affected by cross-site<br />

scripting vulnerabilities. (PK76720)\n\n - Certain files associated with interim fixes for<br />

Unix-based versions of IBM WebSphere Application Server are built with insecure file<br />

permissions. (PK77590)\n\n - The Web Services <strong>Security</strong> component is affected by an<br />

unspecified security issue in digital-signature specification. (PK80596)\n\n - It may be<br />

possible for an attacker to read arbitrary application-specific war files. (PK81387)\n\n - The<br />

application is prone to a session-highjacking vulnerability related to the 'forced logout'<br />

feature. (PK74966)\n\n - A vulnerability affects the XML Digital Signature Specification in<br />

the web services security component. (PK80596)\n\nThe reported version of WebSphere is:<br />

%L\n<br />

Solution: Apply Fix Pack 3 (7.0.0.3) or higher.<br />

CVE-2009-0903<br />

FTP Server .divx file Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4992 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1319

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!