27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

vulnerabilities : \n\n - The administrative component's secure login page fails to redirect to<br />

an 'https: //' page when it receives an 'http: //' request. (PK77010)\n\n - An unspecified<br />

security issue affects 'wsadmin' in the 'SystemManagement/Repository' component.<br />

(PK77235)\n\n - An information disclosure vulnerability affects the 'Configservice APIs' in<br />

the Administrative Console' component. (PK84999)\n\n - An unspecified vulnerability<br />

affects the '<strong>Security</strong>' component, which permits 'non-standard HTTP methods'.<br />

(PK773246)\n\n - A security-bypass vulnerability when users use JAX-WS applications<br />

with a WS-<strong>Security</strong> policy set at the operational level. (PK87767)\n\n - A denial-of-service<br />

vulnerability caused because the application uses insecure obfuscation in web services.<br />

(PK79275)\n\n - An information disclosure vulnerability affecting the Migration<br />

component when WAS is migrated from version 6.1 to 7.0 and tracing is enabled.<br />

(PK80337)\n\n - A security-bypass issue caused by an error in the Single Sign-on with<br />

SPNEGO implementation. (PK77465)\n\n - A security-bypass vulnerability due to an<br />

unspecified error when configured with CSIv2 <strong>Security</strong> with Identity Assertion.<br />

(PK83097)\n\nFor your information, the installed version of WebSphere is : \n %L<br />

Solution: Apply Fix Pack 25 (6.1.0.25) or later.<br />

CVE-2009-0904<br />

RT: Request Tracker 'ShowConfigTab' <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 5078 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a web application that is affected by a security<br />

bypass vulnerability.\n\nThe remote host is running RT: Request Tracker, an<br />

enterprise-grade ticketing system. The version detected is affected by a security bypass<br />

vulnerability because the 'ShowConfigTab' right unintentionally enabled users to edit<br />

global RT at a Glance. An attacker could exploit this to edit the application's configuration.<br />

For your information, the reported version of RT is : \n %L<br />

Solution: Upgrade to RT 3.6.8 / 3.8.4<br />

CVE Not available<br />

Google Chrome < 1.0.154.53 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5079 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:39499<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

1.0.154.53. Such versions are reportedly affected by a multiple vulnerabilities : \n\n - The<br />

browser uses the HTTP Host header to determine the context of a 4xx/5xx CONNECT<br />

response from a proxy server. This could allow a man-in-the-middle attacker to execute<br />

arbitrary script code in the context of a legitimate server. (CVE-2009-2060)\n\n - The<br />

browser displays a cached certificate for 4xx/5xx CONNECT response pages from a proxy<br />

server. A man-in-the-middle attacker could exploit this by displaying a spoofed web page<br />

with the valid certificate of a legitimate website.\n\n For your information, the reported<br />

Family Internet Services 1346

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!