27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

affected by different vulnerabilities.\nIAVA Reference : 2010-A-0022\nSTIG Finding<br />

Severity : Category II<br />

Solution: Upgrade to RealPlayer SP 1.0.5 or later.<br />

CVE-2009-4248<br />

DNS Client Query Detection<br />

<strong>PVS</strong> ID: 5326 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client has issued a name query for the following FQDN<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Apache Tomcat < 5.5.29 / 6.0.24<br />

<strong>PVS</strong> ID: 5327 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44314<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

version of Apache Tomcat installed on the remote host is earlier than 5.5.29, or 6.0.24.<br />

Such versions are potentially affected by multiple vulnerabilities : \n\n - When deploying<br />

WAR files, the WAR files are not checked for directory traversal attempts. This allows an<br />

attacker to create arbitrary content outside of the web root by including entries such as<br />

'../../bin/catalina.sh' in the WAR. (CVE-2009-2693)\n\n - By default, Tomcat automatically<br />

deploys any directories placed in a host's appBase. Depending on circumstances, files<br />

normally protected by one or more security constraints may be deployed without those<br />

security constraints, making them accessible without authentication. (CVE-2009-2901)\n\n<br />

- When deploying WAR files, the WAR file names are not checked for directory traversal<br />

attempts, which could lead to the deletion of arbitrary files in the host's work directory.<br />

(CVE-2009-2902)\n\nFor your information, but observed version of Apache Tomcat is : \n<br />

%L<br />

Solution: Upgrade to Apache Tomcat 5.5.29, 6.0.24, or later.<br />

CVE-2009-2902<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 4.0.249.78 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5328 FAMILY: Web Clients RISK: HIGH NESSUS ID:44317<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.0.249.78. Such versions are potentially affected by multiple vulnerabilities : \n\n - A<br />

pop-up blocker bypass. (3275)\n\n - Cross-domain theft due to CSS design error.<br />

(9877)\n\n - Browser memory error with stale pop-up block menu. (12523)\n\n - An<br />

Family Internet Services 1425

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!