27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2009-2417<br />

ViewVC < 1.0.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5131 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running ViewVC, a web-based interface for CVS and Subversion. The installed version<br />

of ViewVC is earlier than 1.0.9. Such versions are potentially affected by multiple issues :<br />

\n\n - A cross-site scripting vulnerability in the 'view' parameter.\n\n - An unspecified<br />

vulnerability that may allow attackers to print illegal parameter names and values.\n\nFor<br />

your information, the reported version of ViewVC is: \n %L<br />

Solution: Upgrade to ViewVC 1.0.9 or later.<br />

CVE Not available<br />

Sun Java System Access Manager 7.1 < Patch 2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5132 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35618<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Sun Java System Access Manager 7.1 earlier than Patch 2. Such<br />

versions are potentially affected by multiple issues : \n\n - A vulnerability may allow<br />

unauthorized access to resources by revealing passwords to remote users who have<br />

privileges to access the administration console. (1-66-242166-1)\n\n - A sub-realm<br />

administrator may be able to escalate their privileges and access the root realm as an<br />

administrator. (1-66-249106-1)\n\n - A username-enumeration weakness could allow an<br />

attacker to determine valid user-names. (1-66-242026-1)\n\nFor your information, the<br />

installed version of Sun Java System Access Manager is: \n %L \nIAVT Reference :<br />

2009-T-0007\nSTIG Finding Severity : Category II<br />

Solution: Upgrade to Sun Java System Access Manager 7.1 Patch 2. This may require different<br />

patches depending on your installation type.<br />

CVE-2009-0348<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sun Java System Access Manager 7.1 < Patch 3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5133 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Sun Java System Access Manager 7.1 earlier than Patch 3. Such<br />

versions are potentially affected by multiple issues :\n\n - A vulnerability related to the<br />

CDCServlet component may result in policy advice being presented to the wrong client.<br />

(1-66-25968-1)\n\n - The software amy disclose clear text passwords in debug files when<br />

the debug flag is enabled. A local unprivileged user could gain unauthorized access to user<br />

identities.\n\n - A vulnerability may exist when the server processes specially crafted XML<br />

Family Internet Services 1363

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!