27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

Zabbix 1.8.x < 1.8.2 'DBCondition' Parameter SQL Injection<br />

<strong>PVS</strong> ID: 5519 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a web application that is vulnerable to a<br />

SQL-injection attack.\n\nThe remote host is running Zabbix, an IT monitoring service. The<br />

installed version of Zabbix is earlier than 1.8.2. Such versions are potentially affected by a<br />

SQL-injection vulnerability in the 'user' parameter of the 'api.jsonrpc.php' script. A remote,<br />

unauthenticated attacker could exploit this flaw to gain control of the affected<br />

application.\nFor your information, the observed version of Zabbix Front-end is: \n %L<br />

Solution: Upgrade to Zabbix 1.8.2 or later.<br />

CVE-2010-1277<br />

Google Chrome < 4.1.249.1064 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5520 FAMILY: Web Clients RISK: HIGH NESSUS ID:46171<br />

Description: Synopsis : \n\nThe remote host is using a web client that is vulnerable to multiple attack<br />

vectors.\n\nThe version of Google Chrome installed on the remote host is earlier than<br />

4.1.249.1064. Such versions are reportedly affected by multiple vulnerabilities : \n\n - A<br />

cross-origin bypass in Google URL. (40445)\n\n - A memory corruption vulnerability in<br />

HTML5 media handling. (40487)\n\n - A memory corruption vulnerability in font handling.<br />

(42294)\n\nFor your information, the observed version of Google Chrome is: \n %L<br />

Solution: Upgrade to Google Chrome 4.1.249.1064 or later.<br />

CVE-2010-1665<br />

JBoss EAP < 4.2.0.CP09 / 4.3.0.CP08 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5521 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:53337<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running JBoss Enterprise Application Platform (JBEAP) < 4.2.0.CP09 /<br />

4.3.0.CP08. Such versions are potentially affected by multiple vulnerabilities.\n\n - The<br />

JMX Console configuration only specified an authentication requirement for requests that<br />

used the GET and POST HTTP 'verbs'. A remote attacker could create an HTTP request<br />

that does not specify GET or POST, causing it to be executed by the default GET handler<br />

without authentication. (CVE-2010-0738)\n\n - It is possible to bypass authentication for<br />

/web-console by specifying a HTTP method other than GET or POST.<br />

(CVE-2010-1428)\n\n - An information disclosure vulnerability that allows attackers to<br />

acquired details about deployed web contexts. (CVE-2010-1429)\n\nFor your information,<br />

the observed version of JBoss Enterprise Application Platform is: \n %L \nIAVB Reference<br />

: 2010-B-0042\nSTIG Finding Severity : Category I<br />

Family Internet Services 1478

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!