27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

user-supplied input to the 'p_p_id' parameter. An unauthenticated can supply malicious data<br />

which is then displayed to an administrator in another page. For your information, the<br />

observed version of Liferay Portal is: \n %L<br />

Solution: Upgrade to Liferay Portal 5.3.0 or later.<br />

CVE-2009-3742<br />

Trac < 0.11.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5297 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting Trac, a web-based software<br />

management application. The installed version of Trac is earlier than 0.11.6. Such versions<br />

are potentially affected by multiple vulnerabilities : \n\n - Fixed the policy checks in report<br />

results when using alternate formats.\n\n - Added a check for the 'raw' role that is missing<br />

in docutils < 0.6.\n\nFor your information, the observed version of Trac is: \n %L<br />

Solution: Upgrade to Trac 0.11.6 or later.<br />

CVE Not available<br />

Pidgin < 2.6.5 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5298 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43862<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Pidgin < 2.6.5. Such versions are potentially affected by an information<br />

disclosure vulnerability because the MSN protocol plugin axtracts the filename of a custom<br />

emoticon from an incoming request and uploads that file without correlating the filename to<br />

a valid custom emoticon. For your information, the observed version of Pidgin is: \n %L<br />

Solution: Upgrade to Pidgin 2.6.5 or later.<br />

Web Client Detection<br />

CVE-2010-0013<br />

<strong>PVS</strong> ID: 5299 FAMILY: Web Clients RISK: NONE NESSUS ID:Not Available<br />

Description: The remote host is using the following Web client : \n%L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1416

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!