27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

PHP 5.2.x < 5.2.12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5281 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43351<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is vulnerable to multiple<br />

attack vectors.\n\nAccording to its banner, the version of PHP 5.2.x installed on the remote<br />

host is earlier than 5.2.12. Such versions are potentially affected by multiple vulnerabilities<br />

: \n\n - A safe_mode bypass in tempnam(). (CVE-2009-3557)\n\n - An open_basedir<br />

bypass in posix_mkfifo(). (CVE-2009-3558)\n\n - A possible denial-of-service via<br />

temporary file exhaustion caused by a failure to limit the number of file uploads per<br />

request. (CVE-2009-4017)\n\n - An arbitrary code execution vulnerability in the<br />

'session.save_path()' function and the '$_SESSION' data structure. (CVE-2009-4143)\n\n -<br />

A cross-site scripting vulnerability becuase the 'htmlspecialcharacters()' function fails to<br />

properly handle some malformed multibyte character sequences.\n\nFor your information,<br />

the observed version of PHP is: \n %L<br />

Solution: Upgrade to PHP version 5.2.12 or later.<br />

CVE-2009-4143<br />

Serv-U < 9.2.0.1 User Directory Information Disclosure<br />

<strong>PVS</strong> ID: 5282 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43369<br />

Description: Synopsis : \n\nThe remote FTP server is affected by an information disclosure<br />

vulnerability.\n\nThe remote FTP server is running Serv-U file Server, an FTP server for<br />

Windows. The installed version is earlier than 9.2.0.1. Such versions are potentially<br />

affected by an information disclosure vulnerability which could allow an attacker to view<br />

directories that are above the user's root directory. For your information, the observed<br />

version of Serv-U is: \n %L<br />

Solution: Upgrade to Serv-U version 9.2.0.1 or later.<br />

CVE-2009-4815<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Adobe Flash Media Server < 3.0.5 / 3.5.3 Multiple Vulnerabilities (APSB09-018) (RTMP over HTTP)<br />

<strong>PVS</strong> ID: 5283 FAMILY: Web Servers RISK: HIGH NESSUS ID:43390<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running Adobe Flash Media server. The installed version of Adobe Flash Media server<br />

appears to be earlier than 3.0.5 or 3.5.3. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A resource exhaustion vulnerability that could lead to a denial of<br />

service. (CVE-2009-3791)\n\n - A directory traversal vulnerability that could lead to FMS<br />

loading arbitrary DLLs present on the server. (CVE-2009-3792)\n\nFor your information,<br />

the observed version of Adobe Flash Media Server is: \n %L<br />

Family Internet Services 1411

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!