27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote web server contains a CGI application that is vulnerable to a<br />

remote code execution attack.\n\nThe remote web server is running a version of MapServer<br />

earlier than 4.10.5 / 5.2.3 / 5.4.2. Such versions are potentially affected by an<br />

integer-overflow vulnerability when the application handles large HTTP requests<br />

containing specially crafted 'Content-Length' values. For your information, the observed<br />

version of MapServer is: \n %L<br />

Solution: Upgrade to MapServer 4.10.5, 5.2.3, or 5.4.2.<br />

CVE-2009-0840<br />

BASE < 1.4.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5211 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42264<br />

Description: Synopsis : \n\nThe remote host is running a PHP application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running BASE, a web-based tool for analyzing alerts<br />

from one or more SNORT sensors. The version of BASE installed on the remote host is<br />

earlier than 1.4.4. Such versions are potentially affected by multiple issues : \n\n - A<br />

SQL-injection flaw.\n\n - A cross-site scripting vulnerability in 'base_local_rules.php'.\n\n -<br />

A local file include vulnerability in 'base_local_rules.php'.\n\nFor your information, the<br />

observed version of BASE is: \n %L<br />

Solution: Upgrade to BASE version 1.4.4 or later.<br />

CVE Not available<br />

GNU Wget SSL Certificate <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 5212 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is affected by a security bypass vulnerability.\n\nThe<br />

remote host is using a version of Wget earlier than 1.12. Such versions are potentially<br />

affected by a security bypass vulnerability because the application fails to properly handle<br />

Common Name fields n X.509 certificates that contain an ASCII NULL character. For your<br />

information, the observed version of Wget is: \n %L<br />

Solution: Upgrade to Wget 1.12 or later.<br />

CVE-2009-3490<br />

Windows NETBIOS Workstation Name Detection<br />

<strong>PVS</strong> ID: 5213 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK: Risk<br />

not available<br />

NESSUS ID:Not Available<br />

Family Internet Services 1388

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!