27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host contains a mail client that is affected by multiple<br />

vulnerabilities.\n\nThe installed version of Mozilla Thunderbird is earlier than 3.0.2. Such<br />

versions are potentially affected by the following security issues : \n\n - Multiple crashes<br />

can result in arbitrary code execution. (MFSA 2010-01)\n\n - The HTML parser incorrectly<br />

frees used memory when insufficient space is available to process remaining input. (MFSA<br />

2010-03)\n\n - Multiple crashes can result in arbitrary code execution. (MFSA<br />

2010-11)\n\n - A cross-site scripting issue when using 'addEventListener' and 'setTimeout'<br />

on a wrapped object. (MFSA 2010-12)\n\n - It is possible to corrupt a user's XUL cache.<br />

(MFSA 2010-14)\n\nFor your information, the observed version of Thunderbird is: \n %L<br />

Solution: Upgrade to Mozilla Thunderbird 3.0.2 or later.<br />

CVE-2010-0171<br />

Apache < 2.2.15 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5356 FAMILY: Web Servers RISK: HIGH NESSUS ID:45004<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the version of Apache 2.2 installed on the remote host<br />

is older than 2.2.15. Such versions are potentially affected by multiple vulnerabilities : \n\n<br />

- A TLS renegotiation prefix attack is possible. (CVE-2009-3555)\n\n - The<br />

'mod_proxy_ajp' module returns the wrong status code if it encounters an error which<br />

causes the back-end server to be put into an error state. (CVE-2010-0408)\n\n - The<br />

'mod_isapi' module attempts to unload the 'ISAPI.DLL' when it encounters various error<br />

states which could leave call-backs in an undefined state. (CVE-2010-0425)\n\n - A flaw in<br />

the core sub-request process code can lead to sensitive information from a request being<br />

handled by the wrong thread if a multi-threaded environment is used.<br />

(CVE-2010-0434)\n\nFor your information, the observed version of Apache is: \n %L<br />

\nIAVA Reference : 2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding<br />

Severity : Category I<br />

Solution: Either ensure the affected module is not in use or upgrade to Apache version 2.2.15 or later.<br />

CVE-2010-0434<br />

Trojan/Backdoor - Arugizer Detection<br />

<strong>PVS</strong> ID: 5357 FAMILY: Backdoors RISK: HIGH NESSUS ID:45006<br />

Description: Synopsis :\n\nThe remote host has been compromised and is running a 'Backdoor'<br />

program\n\nArugizer backdoor activity has been detected. This indicates that a successful<br />

reply to a YES command sent to the Arugizer backdoor has been seen, which is a clear sign<br />

that the backdoor is installed and responding to commands.<br />

Solution: Update your Antivirus and perform a full scan of the remote operating system.<br />

CVE-2010-0103<br />

OpenSSL < 0.9.8m Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1435

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!