27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is vulnerable to multiple<br />

attack vectors.\n\nAccording to its banner, the version of PHP 5.3.x installed on the remote<br />

host is earlier than 5.3.1. Such versions are potentially affected by multiple issues : \n\n -<br />

Sanity checks are missing in exif processing.\n\n - It is possible to bypass the 'safe_mode'<br />

configuration setting using 'tempnam()'.\n\n - It is possible to bypass the 'open_basedir'<br />

configuration setting using 'posix_mkfifo()'.\n\n - The 'safe_mode_include_dir'<br />

configuration setting may be ignored.\n\n - Calling 'popen()' with an invalid mode can<br />

cause a crash.\n\n - A safe_mode restriction-bypass vulnerability because environment<br />

variables specified for 'proc_open' are passed without checking them.\n\nFor your<br />

information, the observed version of PHP is: \n %L<br />

Solution: Upgrade to PHP version 5.3.1 or later.<br />

CVE-2009-4018<br />

BIND 9 DNSSEC Query Response Remote Cache Poisoning<br />

<strong>PVS</strong> ID: 5243 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42983<br />

Description: Synopsis :\n\nThe remote DNS Server is vulnerable to a remote cache-poisoning<br />

attack.\n\nThe remote DNS Server is running BIND 9 earlier than 9.4.3-P4, 9.5.2-P1, or<br />

9.6.1-P2. Such versions may incorrectly ad records to its cache from the additional section<br />

of responses received during resolution of a recursive client query. This behavior only<br />

occurs when processing client queries with checking disabled (CD) at the same time as<br />

requesting DNSSEC records (DO). For your information, the observed version of BIND 9<br />

is\n%L<br />

Solution: Upgrade to BIND 9.4.3-P4 / 9.5.2-P1 / 9.6.1-P2 or later.<br />

CVE-2009-4022<br />

IBM Solid Database < 6.30.0.37 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5244 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42877<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to a denial-of-service<br />

attack.\n\nThe remote host is running IBM SolidDB. The installed version of SolidDB is<br />

earlier than 6.30.0.37. Such versions are potentially affected by a denial-of-service in<br />

'solid.exe' when handling a specially crafted network packet containing an invalid error<br />

code. For your information, the observed version of IBM SolidDB is : \n %L<br />

Solution: Upgrade to IBM SolidDB 6.30.0.37 or later.<br />

CVE-2009-3840<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1399

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!