27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to Interchange 5.7.2, 5.6.2, or 5.4.4.<br />

CVE Not available<br />

Firebird Database Client Detection<br />

<strong>PVS</strong> ID: 5181 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a Firebird Database client.<br />

Solution: N/A<br />

CVE Not available<br />

iTunes < 9.0.1 Remote Code Execution<br />

<strong>PVS</strong> ID: 5182 FAMILY: Web Clients RISK: HIGH NESSUS ID:41061<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a remote code execution<br />

attack.\n\nAccording to its banner, the version of iTunes installed on the remote host is<br />

older than 9.0.1. Such versions are potentially affected by a remote buffer overflow when<br />

opening specially crafted '.pls' files. An attacker could exploit this flaw to execute arbitrary<br />

code on the remote host subject to the privileges of the user running the application. For<br />

your information, the reported version of iTunes is: \n %L<br />

Solution: Upgrade to iTunes 9.0.1 or later.<br />

CVE-2009-2817<br />

IBM WebSphere Application Server < 6.1.0.27 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5183 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41057<br />

Description: Synopsis : \n\nThe remote host is running a web server that is vulnerable to multiple attack<br />

vectors.\n\nIBM WebSphere Application Server 6.1.0 before Fix Pack 27 appears to be<br />

running on the remote host. Such versions are potentially affected by multiple issues : \n\n -<br />

Eclipse help system included with WebSphere Application Server is affected by a cross-site<br />

scripting vulnerability. (PK78917)\n\n - It may be possible to bypass security restrictions<br />

using a specially crafted HTTP HEAD method. (PK83258)\n\n - New applications<br />

deployed in WebSphere Application Server for z/OS prior to 1.8 are saved on the file<br />

system with insecure privileges resulting in disclosure of sensitive information.<br />

(PK83308)\n\n - If JAAS-J2C Authentication Data is configured using wsadmin scripts, the<br />

password value may appear in FFDC logs. (PK86137)\n\n - Apache APR-util is affected by<br />

a denial of service issue. (PK88341)\n\n - Due to an error in expat XML parser APR-util is<br />

affected by a denial of service issue. (PK88342)\n\n - It may be possible to trigger a denial<br />

of service attack due to errors in fix packs 6.1.0.23 and 6.1.0.25. (PK91709)\n\nFor your<br />

information, the reported version of WebSphere is: \n %L<br />

Solution: Apply Fix Pack 27 (6.1.0.27) or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1379

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!