27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the version of Apache 2.2 installed on the remote host<br />

is older than 2.2.14. Such versions are potentially affected by multiple vulnerabilities : \n\n<br />

- Faulty error handling in the Solaris pollset support (Event Port backend) which could<br />

trigger hangs in the prefork and event MPMs on that platform (CVE-2009-2699)\n\n - The<br />

'ap_proxy_ftp_handler' function in 'modules/proxy/proxy_ftp.c in the 'mod_proxy_ftp'<br />

module allows remote FTP servers to cause a denial-of-service via a malformed reply to an<br />

EPSV command. (CVE-2009-3094)\n\n - The 'mod_proxy_ftp' module allows remote<br />

attackers to bypass intended access restrictions and send arbitrary commands to an FTP<br />

server. (CVE-2009-3095)\n\n<strong>PVS</strong> cannot determine whether the affected module is in use.<br />

For your information, the observed version of Apache is: \n %L<br />

Solution: Either ensure the affected module is not in use or upgrade to Apache version 2.2.14 or later.<br />

OSSProxy Detection<br />

CVE-2009-3095<br />

<strong>PVS</strong> ID: 5197 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running software that should be authorized with respect<br />

to corporate policy\n\nThe remote client is running OSSProxy.exe, an application that is<br />

marketed to end users as a tool to speed up their Internet connection. The application routes<br />

all web connections through a 3rd party proxy which is made available by NetSetter<br />

(MarketScore). For your information, the User-Agent banner is: \n %L<br />

Solution: Ensure that this software is in line with corporate policies and guidelines.<br />

CVE Not available<br />

Apple iPhone Wireless Connection Detection<br />

<strong>PVS</strong> ID: 5198 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Apple iOS operating system. Further, the iPhone is<br />

connected to the network via a wireless connection.<br />

Solution: Ensure that the wireless connection is secured and operating within corporate guidelines.<br />

CVE Not available<br />

Sophos Enterprise Anti-virus Version Detection<br />

<strong>PVS</strong> ID: 5199 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sophos Enterprise version: %L<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1384

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!