27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

een applied, an unspecified vulnerability in JAX-RPC WS-<strong>Security</strong> component could<br />

incorrectly validate 'UsernameToken'. (PK75992)\n\n - Sample applications shipped with<br />

IBM WebSphere Application Server are affected by cross-site scripting vulnerabilities.<br />

(PK76720)\n\n - The adminitrative console is affected by a cross-site scripting<br />

vulnerability. (PK77505)\n\n - It may be possible for an attacker to read arbitrary<br />

application-specific war files. (PK81387)\n\n - A session highjacking vulnerability exists in<br />

the 'forced logout' feature. (PK74966)\n\nThe reported version of WebSphere is: %L\n<br />

Solution: Apply Fix Pack 23 (6.1.0.23) or higher.<br />

CVE-2009-0506<br />

phpMyAdmin < 3.1.3.2 Multiple Code Execution Vulnerabilities (PMASA-2009-4)<br />

<strong>PVS</strong> ID: 4997 FAMILY: CGI RISK: HIGH NESSUS ID:36171<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that may allow execution<br />

of arbitrary code\n\nThe setup script included with the version of phpMyAdmin installed<br />

on the remote host does not properly sanitize user-supplied input before using it to generate<br />

a config file for the application. This version has the following vulnerabilities : \n\n - The<br />

setup script inserts the unsanitized verbose server name into a C-style comment during<br />

config file generation. \n\n - An attacker can save arbitrary data to the generated config file<br />

by altering the value of the 'textconfig' parameter during a POST request to config.php. An<br />

unauthenticated remote attacker may be able to leverage these issues to execute arbitrary<br />

PHP code.<br />

Solution: Upgrade to version 3.1.3.2 or apply the patches referenced in the project's advisory.<br />

CVE-2009-1285<br />

Firefox < 3.0.9 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4998 FAMILY: Web Clients RISK: HIGH NESSUS ID:36215<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe installed<br />

version of Firefox is earlier than 3.0.9. Such versions are potentially affected by the<br />

following security issues :\n\n - Multiple remote memory corruption vulnerabilities exist<br />

that can be exploited to execute arbitrary code in the context of the user running the<br />

affected application. (MFSA 2009-14)\n\n - A flaw may exist where Unicode box drawing<br />

characters are allowed in Internationalized Domain Names where they could be visually<br />

confused with punctuation used in valid web addresses. An attacker can leverage this to<br />

launch a phishing-type scam against a victim. (MFSA 2009-15)\n\n - A vulnerability exists<br />

when the 'jar:' scheme is used to wrap a URI which serves the content with<br />

'Content-Disposition: attachment'. An attacker can leverage this to subvert sites which use<br />

this mechanism to mitigate content injection attacks. (MFSA 2009-16)\n\n - When an<br />

Adobe Flash file is loaded via the 'view-source:' scheme, the Flash plugin misinterprets the<br />

origin of the content as localhost. An attacker can leverage this to launch cross-site request<br />

forgery attacks. It is also possible to exploit this to place cookie-like objects on victims'<br />

computers. (MFSA 2009-17)\n\n - A vulnerability exists that allows attackers to inject<br />

arbitrary scripts into sites via XBL bindings. This vulnerability requires the attacker to have<br />

Family Internet Services 1321

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!