27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

OpenSSL < 0.9.8n Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5487 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:45359<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the remote web server is running a version of<br />

OpenSSL older than 0.9.8n. Such versions have the following vulnerabilities : \n\n -<br />

Kerberos-enabled versions of OpenSSL do not check the return value when Kerberos<br />

configuration files cannot be opened, leading to a crash. (CVE-2010-0433)\n\n - Rejecting<br />

a SSL/TLS record with and incorrect version number can lead to a crash. This only affects<br />

version 0.9.8m if a 'short' is 1 bits. Otherwise it affects all versions back to and including<br />

0.9.8f. (CVE-2010-0740)\n\nFor your information, the observed version of OpenSSL is: \n<br />

%L<br />

Solution: Upgrade to OpenSSL 0.9.8n or later.<br />

CVE-2010-0740<br />

Interchange HTTP Response Splitting Vulnerability<br />

<strong>PVS</strong> ID: 5488 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is affected by a HTTP response splitting<br />

vulnerability.\n\nThe remote web server is running Interchange, a web-based application<br />

server. The installed version is potentially affected by an HTTP response splitting<br />

vulnerability when the 'BounceReferrals' or 'BounceRobotSessionURL' directives are<br />

enabled.\nFor your information, the observed version of Interchange is: \n %L<br />

Solution: Upgrade to Interchange 5.4.5, 5.6.3, 5.7.6, or later.<br />

CVE Not available<br />

Mac OS X < 10.6.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5489 FAMILY: Generic RISK: HIGH NESSUS ID:45440<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes various security<br />

issues.\n\nThe remote host is running a version of Mac OS X 10.6 that is older than version<br />

10.6.3. Mac OS X 10.6.3 contains security fixes for the following products :\n\n - AFP<br />

Server\n\n - Apache\n\n - CoreAudio\n\n - CoreMedia\n\n - CoreTypes\n\n - CUPS\n\n -<br />

DesktopServices\n\n - Disk Images\n\n - Directory Services\n\n - Dovecot\n\n - Event<br />

Monitor\n\n - FreeRADIUS\n\n - FTP Server\n\n - iChat Server\n\n - ImageIO\n\n - Image<br />

RAW\n\n - Libsystem\n\n - Mail\n\n - MySQL\n\n - OS Services\n\n - Password Server\n\n<br />

- PHP\n\n - Podcast Producer\n\n - Preferences\n\n - PS Normalizer\n\n - QuickTime\n\n -<br />

Ruby\n\n - Server Admin\n\n - SMB\n\n - Tomcat\n\n - Wiki Server\n\n - X11\n\nFor your<br />

information, the observed version of Mac OS X is\n%L\nIAVA Reference :<br />

Family Internet Services 1466

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!