27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5630 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:48273<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a denial-of-service attack.\n\nThe remote<br />

host is running Zoiper, a cross-platform VoIP solution. For your information, the observed<br />

library version of Zoiper %L.\n\nVersions of Zoiper earlier than 2.24 Library 5324 are<br />

potentially affected by a denial-of-service vulnerability because the application fails to<br />

properly handle specially crafted SIP INVITE Requests. An attacker, exploiting this flaw,<br />

could potentially crash the affected application.<br />

Solution: Upgrade to Zoiper 2.24 Library 5324 or later.<br />

CVE-2009-3704<br />

Drupal Devel module < 6.x-1.22 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5631 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is vulnerable to a<br />

cross-site scripting attack.\n\nThe remote web server hosts a Drupal install that uses the<br />

Devel module, a performance logging component. For your information, the observed<br />

version of the Devel Module is %L.\n\nVersions of the Drupal Devel module earlier than<br />

6.x-1.22 are potentially affected by a cross-site scripting vulnerability because the<br />

application fails to properly sanitize URLs comprised of node paths. A remote attacker with<br />

the ability to to add URL aliases could exploit this flaw to execute arbitrary script code in a<br />

user's browser.<br />

Solution: Upgrade to Drupal Devel module 6.x-1.22 or later.<br />

CVE-2010-3022<br />

Drupal OpenID module < 5.x-1.5 Authentication Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5632 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server is hosting a web application that is affected by an<br />

authentication bypass vulnerability.\n\nThe remote web server hosts a Drupal install that<br />

uses the OpenID module, a module that allows users to authenticate via OpenID. For your<br />

information, the observed version of the Drupal OpenID module is %L.\n\nVersions of<br />

Drupal OpenID module earlier than 5.x-1.5 are potentially affected by an authentication<br />

bypass vulnerability because the application fails to implement all the required verifications<br />

from the OpenID 2.0 protocol. A remote attacker, exploiting this flaw, could gain<br />

unauthorized access to the affected Drupal install.<br />

Solution: Upgrade to Drupal OpenID module 5.x-1.5 or later.<br />

CVE-2010-3686<br />

MySQL Server Failed Login Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1515

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!