27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IBM Solid Database < 6.30.0.37 Remote Denial of Service<br />

<strong>PVS</strong> ID: 5245 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:42877<br />

Description: Synopsis : \n\nThe remote database server is vulnerable to a denial-of-service<br />

attack.\n\nThe remote host is running IBM SolidDB. The installed version of SolidDB is<br />

earlier than 6.30.0.37. Such versions are potentially affected by a denial-of-service in<br />

'solid.exe' when handling a specially crafted network packet containing an invalid error<br />

code. For your information, the observed version of IBM SolidDB is : \n %L<br />

Solution: Upgrade to IBM SolidDB 6.30.0.37 or later.<br />

CVE-2009-3840<br />

OpenX < 2.8.2 Arbitrary File Upload<br />

<strong>PVS</strong> ID: 5246 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a remote file upload attack.\n\nThe<br />

remote web server is hosting OpenX, a web-based ad server. The installed version is earlier<br />

than 2.8.2. Such versions are potentially affected by a remote file upload vulnerability. The<br />

application fails to verify the MIME type associated with an uploaded file. An attacker,<br />

exploiting this flaw, could execute arbitrary code on the remote server. For your<br />

information, the observed version of OpenX is: \n %L<br />

Solution: Upgrade to OpenX 2.8.2 or later.<br />

CVE-2009-4098<br />

Sun Solaris sshd Timeout Mechanism Remote Denial of Service<br />

<strong>PVS</strong> ID: 5247 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote SSH server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote Solaris 10 host appears to be running the Solaris sshd daemon earlier<br />

than version 1.1.3. Such versions are potentially affected by a denial-of-service<br />

vulnerability in the timeout mechanism. An unprivileged attacker, exploiting this flaw,<br />

could crash the affected service. For your information, the observed version of Solaris sshd<br />

is: \n %L<br />

Solution: Apply patch 143140-01 or later, as referenced above.<br />

CVE-2009-4075<br />

RT: Request Tracker Session Fixation Vulnerability<br />

<strong>PVS</strong> ID: 5248 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43006<br />

Family Internet Services 1400

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!