27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote web server is affected by multiple vulnerabilities.\n\nThe<br />

version of Apache Tomcat installed on the remote host is affected by a multiple<br />

vulnerabilities : \n\n - A username enumeration vulnerability exists when FORM based<br />

authentication with either the MemoryRealm, DataSourceRealm, or JDBCRealm is used.<br />

(CVE-2009-0580)\n\n - A denial of service exists if Tomcat receives a request with invalid<br />

headers via the Java AJP connector. (CVE-2009-0033)\n\n - A remote<br />

information-disclosure vulnerability exists in the 'RequestDispatcher' can be exploited to<br />

gain access to content in the 'WEB-INF' directory. (CVE-2008-5515)\n\n - It is possible for<br />

a web application to replace the XML parser used by Tomcat to process 'web.xml',<br />

'context.xml', and 'tld' files.\n\nFor your information, the reported version of Apache<br />

Tomcat is : \n %L<br />

Solution: Upgrade to Apache Tomcat 4.1.40 / 5.5.28 / 6.0.20<br />

CVE-2009-0783<br />

LogMeIn 'cfgadvanced.html' HTTP Header Injection<br />

<strong>PVS</strong> ID: 5045 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a HTTP header injection<br />

vulnerability.\n\nThe remote host is a LogMeIn server awaiting remote connections. The<br />

installed version of LogMeIn is 4.0.784 or earlier. Such versions are reportedly affected by<br />

a HTTP header injection vulnerability. An attacker could exploit this in order to launch<br />

various attacks including cross-site scripting, and cross-site request forgery. For your<br />

information, the installed version is: \n %L<br />

Solution: Disable this service if it is not needed.<br />

CVE Not available<br />

Safari < 4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5046 FAMILY: Web Clients RISK: HIGH NESSUS ID:39339<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Safari installed on the remote host is earlier than 4.0. Such<br />

versions are potentially affected by numerous issues in the following components : \n\n -<br />

CF<strong>Network</strong>\n\n - CoreGraphics\n\n - ImageIO\n\n - International Components for<br />

Unicode\n\n - libxml\n\n - Safari\n\n - Safari Windows Installer\n\n - WebKit\n\nFor your<br />

information, the reported version of Safari is : \n %L<br />

Solution: Upgrade to Safari 4.0 or later.<br />

CVE-2009-1718<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1337

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!