27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Apache Axis2 < 1.5 'xsd' Parameter Directory Traversal<br />

<strong>PVS</strong> ID: 5554 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46741<br />

Description: Synopsis :\n\nThe remote web server hosts a web application that is vulnerable to a<br />

directory traversal attack.\n\nThe remote web server is hosting Axis2, a web services<br />

engine. For your information, the observed version of Axis2 is : %L\n\nVersions of Axis2<br />

earlier than 1.5 are potentially affected by a directory traversal vulnerability in the 'xsd'<br />

parameter in activated services. An attacker, exploiting this flaw, can read arbitrary files on<br />

the affected host.<br />

Solution: Upgrade to Apache Axis2 1.5 or later.<br />

CVE Not available<br />

Acme thttpd Version Detection<br />

<strong>PVS</strong> ID: 5555 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: N/A<br />

Solution: N/A<br />

CVE Not available<br />

DB2 9.7 < Fix Pack 2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5556 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:46766<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nFor<br />

your information, the observed version of IBM DB2 is %L\n\nVersions of IBM DB2 9.7<br />

earlier than Fix Pack 2 are potentially affected by multiple vulnerabilities :\n\n - If the<br />

database configuration parameter 'AUTO_REVAL' is set to 'IMMEDIATE', system granted<br />

privileges are note regenerated. (IC67008)\n\n - 'Monitor Administrative Views' available<br />

in the SYSIBMADM schema are publicly viewable. (IC67819)\n\n - A weakness in the<br />

SSL v3 / TLS protocol involving session renegotiation may allow an attacker to inject an<br />

arbitrary amount of plaintext into the beginning of the application protocol stream, which<br />

could facilitate man-in-the-middle attacks. (IC68055)\n\n - By sending a specially crafted<br />

packet to Tivoli Monitoring Agent (KUDDB2) listening on TCP port 6014, it may be<br />

possible to trigger a denial of service condition. (IC68762)<br />

Solution: Upgrade to IBM DB2 9.7 Fix Pack 2<br />

CVE-2010-0472<br />

Exim < 4.72 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1488

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!