27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is a NETBIOS workstation<br />

Solution: N/A<br />

CVE Not available<br />

XML Request Possible userID / password Cleartext Remote Disclosure<br />

<strong>PVS</strong> ID: 5214 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote XML client posted a request with what appears to be an embedded<br />

userID and/or password. You should manually verify that confidential data is not<br />

being leaked from the network. The observed XML request was: \n %L<br />

Solution: Ensure that confidential data is not passed via plain text form fields.<br />

CVE Not available<br />

Database Client Detection<br />

<strong>PVS</strong> ID: 5215 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is running a database client<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

nginx HTTP Request Header Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 5216 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:41608<br />

Description: Synopsis : \n\nThe remote web server is affected by a remote denial of service<br />

vulnerability.\n\nThe remote host is running a version of nginx web server earlier than<br />

0.5.38, 0.6.39, or 0.7.62. Such versions are potentially affected by a remote denial of<br />

service vulnerability because the application fails to to perform adequate bounds checking<br />

in the 'ngx_http_process_request_headers()' function of the 'src/http/ngx_http_request.c'<br />

source file. An attacker, exploiting this flaw, can cause the web server to crash, or<br />

potentially run arbitrary code subject to the privileges of the web server process.\n\nFor<br />

your information, the observed version of nginx is: \n %L<br />

Solution: Apply the patch from the vendor, or upgrade to nginx 0.5.38, 0.6.39, or 0.7.62<br />

CVE-2009-3896<br />

Opera < 10.01 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5217 FAMILY: Web Clients RISK: HIGH NESSUS ID:42291<br />

Family Internet Services 1389

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!