27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote client is an Android mobile device version: \n %L<br />

Solution: Ensure that such devices are within corporate standards<br />

CVE Not available<br />

ViewVC < 1.1.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5288 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote web server is running ViewVC, a web-based interface for CVS and Subversion. The<br />

installed version of ViewVC is earlier than 1.1.3. Such versions are potentially affected by<br />

multiple issues : \n\n - A security vulnerability that involves root listing support of per-root<br />

authorization configuration.\n\n - A security vulnerability in the 'query.py' involving the<br />

'forbidden' authorizer.\n\nFor your information, the observed version of ViewVC is: \n %L<br />

Solution: Upgrade to ViewVC 1.1.3 or later.<br />

CVE Not available<br />

Sun Java System Directory Proxy Server 6.x < 6.3.1 Update 1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5289 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43615<br />

Description: Synopsis : \n\nThe remote host is running the Sun Java system Directory Proxy Server, and<br />

LDAP proxy server from Sun Microsystems. The installed version is earlier than 6.3.1<br />

Update 1. Such versions are potentially affected by multiple vulnerabilities : \n\n - Under<br />

certain conditions simultaneous long binds are incorrectly assigned the same backed<br />

connections. An attacker may exploit this flaw to hijack an authenticated user's session and<br />

perform unauthorized operations. (CVE-2009-4440)\n\n - 'SO_KEEPALIVE' socket option<br />

is not enabled, and hence it may be possible for a remote attacker to trigger a denial of<br />

service condition by exhausting available connection slots. (CVE-2009-4441)\n\n -<br />

'max-client-connections' configuration setting is not correctly implemented, thus it may be<br />

possible for a remote attacker to trigger a denial of service condition. (CVE-2009-4442)\n\n<br />

- An unspecified vulnerability in the 'psearch' functionality could allow an attacker to<br />

trigger a denial of service condition. (CVE-2009-4443)\n\nFor your information, the<br />

observed version of Sun Java System Directory Proxy server is: \n %L \nIAVB Reference :<br />

2010-B-0002\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Sun Java System Directory Server 6.3.1 and apply patch 141958-01<br />

CVE-2009-4443<br />

Centreon < 2.1.4 <strong>Security</strong> Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5290 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1413

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!