27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

version of Google Chrome is : \n %L<br />

Solution: Upgrade to Google Chrome 1.0.154.53 or later.<br />

CVE-2009-2071<br />

PHP < 5.2.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5080 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

vulnerabilities.\n\nAccording to its banner, the version of PHP installed on the remote host<br />

is earlier than 5.2.10. Such versions are reportedly affected by multiple vulnerabilities : \n\n<br />

- A restriction-bypass vulnerability could allow the execution of arbitrary commands when<br />

'safe_mode' is enabled 'safe_mode_exec_dir' is not set. This issue only affects PHP on<br />

Windows. (bug 45997)\n\n - A denial of service vulnerability is triggered when an<br />

application processes a 'JPEG' image file through a call to the 'exif_read_data()' function.<br />

(bug 48378).\n\nFor your information, the reported version of PHP is : \n %L<br />

Solution: Upgrade to PHP version 5.2.10 or later.<br />

CVE-2009-2687<br />

Microsoft .NET Hidden 'ViewState' Detection<br />

<strong>PVS</strong> ID: 5081 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote .NET application stores state information within a hidden form field. Further,<br />

the information is not hashed. Given this, an attacker can modify the ViewState string in<br />

transit and possibly alter the state or output of the .NET application. The path to the<br />

application is: %P<br />

Solution: Enable hashing of the ViewState string. This can be accomplished by setting<br />

'enableViewStateMac<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 2.0.172.33 Buffer Overflow vulnerability<br />

<strong>PVS</strong> ID: 5082 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to a buffer<br />

overflow attack.\n\nThe version of Google Chrome installed on the remote host is earlier<br />

than 2.0.172.33. Such versions are reportedly affected by a buffer overflow vulnerability<br />

when handling certain responses from HTTP servers. An attacker could exploit this issue to<br />

cause a denial of service, or execute arbitrary code with the privileges of the logged on<br />

user. For you information, the reported version is : \n %L<br />

Solution: Upgrade to Google Chrome 2.0.172.33 or later.<br />

Family Internet Services 1347

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!