27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to Adobe Flash Media Server 3.0.5, 3.5.3 or later.<br />

CVE-2009-3792<br />

Adobe Flash Media Server < 3.5.3 Multiple Vulnerabilities (APSB09-018) (RTMP)<br />

<strong>PVS</strong> ID: 5284 FAMILY: Web Servers RISK: HIGH NESSUS ID:43390<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running Adobe Flash Media server. The installed version of Adobe Flash Media server<br />

appears to be earlier than 3.5.3. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A resource exhaustion vulnerability that could lead to a denial of<br />

service. (CVE-2009-3791)\n\n - A directory traversal vulnerability that could lead to FMS<br />

loading arbitrary DLLs present on the server. (CVE-2009-3792)\n\nFor your information,<br />

the observed version of Adobe Flash Media Server is: \n %L<br />

Solution: Upgrade to Adobe Flash Media Server 3.5.3 or later.<br />

CVE-2009-3792<br />

OpenX < 2.8.3 Authentication-Bypass<br />

<strong>PVS</strong> ID: 5285 FAMILY: CGI RISK: HIGH NESSUS ID:43864<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to an authentication bypass<br />

attack.\n\nThe remote web server is hosting OpenX, a web-based ad server. The installed<br />

version is earlier than 2.8.3. Such versions are potentially affected by an authentication<br />

bypass vulnerability because the application allows anonymous access to the administrative<br />

interface. For your information, the observed version of OpenX is: \n %L<br />

Solution: Upgrade to OpenX 2.8.3 or later.<br />

CVE-2009-4830<br />

Web Server - BitTorrent .torrent File Detection<br />

<strong>PVS</strong> ID: 5286 FAMILY: Data Leakage RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server is hosting .torrent files. These are files which are used by various<br />

BitTorrent clients to initiate a torrent download. As an example, consider the following file<br />

%P\nDistributing such files over the web can be done, but the webmaster should make sure<br />

that such file sharing is authorized with respect to policies and guidelines.<br />

Solution: N/A<br />

CVE Not available<br />

Android Mobile Device Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5287 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1412

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!