27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 5358 FAMILY: Web Servers RISK: HIGH NESSUS ID:45039<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nAccording to its<br />

banner, the remote host is running a version of OpenSSL older than 0.9.8m. Such versions<br />

potentially have the following vulnerabilities : \n\n - Session renegotiations are not handled<br />

properly, which could be exploited to insert arbitrary plaintext by a man-in-the-middle.<br />

(CVE-2009-3555)\n\n - The library does not check for a NULL return value from calls to<br />

the bn_wexpand() function, which has unspecified impact. (CVE-2009-3245)\n\nFor your<br />

information, the observed version of OpenSSL is: \n %L \nIAVA Reference :<br />

2011-A-0107\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to OpenSSL 0.9.8m or later.<br />

CVE-2009-3555<br />

Mozilla Firefox cpe Version Detection<br />

<strong>PVS</strong> ID: 5359 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Firefox version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Samba 3.3.11 / 3.4.6 / 3.5.0 <strong>Security</strong> Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5360 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45047<br />

Description: Synopsis : \n\nThe remote Samba server is vulnerable to a security bypass<br />

attack.\n\nAccording to its banner, the version of Samba Server on the remote host is<br />

potentially affected by a security bypass vulnerability. A flaw exists that causes all smbd<br />

processes to inherit CAP_DAC_OVERRIDE capabilities, allowing all file system access to<br />

be allowed even when permissions should have denied access. For your information, the<br />

observed version of Samba is: \n %L<br />

Solution: Upgrade to Samba 3.3.12, 3.4.7, 3.5.1<br />

CVE-2010-0728<br />

Safari < 4.0.5 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5361 FAMILY: Web Clients RISK: HIGH NESSUS ID:45045<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Safari installed on the remote host is earlier than 4.0.5. Such<br />

versions are potentially affected by several issues : \n\n A buffer underflow in ImageIO's<br />

handling of TIFF images could lead to a crash or arbitrary code execution.<br />

(CVE-2009-2285)\n\n - An integer overflow in the handling of images with an embedded<br />

color profile could lead to a crash or arbitrary code execution. (CVE-2010-0040)\n\n - An<br />

Family Internet Services 1436

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!