27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

possible to downgrade the ciphersuite to a weaker version by modifying the stored session<br />

cache cipher suite.\n\n - An error exists in the J-PAKE implementation which could lead to<br />

successful validation by someone with no knowledge of the shared secret.\nIAVA<br />

Reference : 2011-A-0160\nIAVB Reference : 2012-B-0038\nSTIG Finding Severity :<br />

Category I<br />

Solution: Upgrade to OpenSSL 0.9.8q, 1.0.0c, or later.<br />

CVE-2010-4252<br />

Stuxnet Traffic Detection<br />

<strong>PVS</strong> ID: 5721 FAMILY: Backdoors RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is passing RPC traffic which is requesting an RPC UUID which is<br />

synonymous with the Stuxnet trojan. This may indicate that either the host is infected with<br />

Stuxnet or the host is scanning for Stuxnet-infected machines.<br />

Solution: Ensure that the system is not infected. If it is not infected, ensure that the system is<br />

authorized to be running security scans on the network.<br />

CVE Not available<br />

ClamAV < 0.96.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5722 FAMILY: Web Clients RISK: HIGH NESSUS ID:51125<br />

Description: Synopsis :\n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is %L.<br />

Versions of ClamAV earlier than 0.96.5 are potentially affected by multiple vulnerabilities<br />

:\n\n - Multiple error exists in the PDF processing functions in 'libclamav/pdf.c' which may<br />

lead to application crashes. (Bugs 2358, 2380, 2396)\n\n - An off-by-one error exists in the<br />

handling of icons such that a crafted icon may be used to cause an integer overflow. (Bug<br />

2344)<br />

Solution: Upgrade to ClamAV 0.96.5 or later.<br />

CVE-2010-4479<br />

JavaScript eval() Usage on Web Server<br />

<strong>PVS</strong> ID: 5723 FAMILY: Policy RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application\n\nThe remote web server utilizes JavaScript on it's pages. The use of the<br />

JavaScript 'eval()' function is considered very dangerous. The Javascript in question is %P.<br />

Solution: Remove calls to 'eval()' from javascript source code<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1548

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!