27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting a version of Bugzilla that is<br />

earlier than 3.0.11, 3.2.6, 3.4.5, or 3.5.3. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - Bugzilla allows web browsers to serve the contents of files in the<br />

'CVS/', 'contrib/', 'docs/en/xml', and 't/' directories as well as the 'old-params.txt' file.\n\n -<br />

When moving a bug from one product to another, an intermediate web page is displayed<br />

letting you select the groups the bug should be restricted to in the new product. Because of<br />

a regression in Bugzilla 3.4.x involving groups, a private bug could temporarily become a<br />

public.\n\nFor your information, the observed version of Bugzilla is: \n %L<br />

Solution: Upgrade to Bugzilla 3.0.11, 3.2.6, 3.4.5, 3.5.3, or later.<br />

CVE-2009-3989<br />

Squid 3.0STABLE23 / 3.1.0.16 Remote DoS<br />

<strong>PVS</strong> ID: 5332 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44384<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (Dos)<br />

attack.\n\nAccording to its banner, the version of Squid proxy caching server installed on<br />

the remote host is 2.x or 3.x earlier than 3.0.STABLE23 or 3.1.0.16. Such versions<br />

reportedly use incorrect data validation when processing specially crafted DNS packets. An<br />

attacker, exploiting this flaw, could cause a short term denial of service. For your<br />

information, the observed version of Squid is: \n %L<br />

Solution: Either upgrade to Squid version 3.0.STABLE23 or 3.1.0.16 or later, or apply the patch<br />

referenced in the project's advisory above.<br />

CVE-2010-0308<br />

MySQL 6.0 < 6.0.9 CREATE TABLE <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 5333 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to security bypass attack.\n\nThe version of<br />

MySQL 6.0 installed on the remote host is earlier than 6.0.9, and thus potentially affected<br />

by a security bypass vulnerability. The application allwos an attacker to bypass certain<br />

checks when creating a table with ceratin 'DATA DIRECTORY' and 'INDEX<br />

DIRECTORY' options that are within the MySQL home data directory. For you<br />

information, the observed version of MySQL is: \n %L<br />

Solution: Upgrade to MySQL Community Server version 6.0.9 or later.<br />

CVE-2008-7247<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

OTRS Core System Multiple Unspecified SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 5334 FAMILY: CGI NESSUS ID:Not Available<br />

Family Internet Services 1427

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!