27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is affected by an information disclosure<br />

vulnerability.\n\nFor your information, the observed version of OpenSSH installed on the<br />

remote host is : \n %L \n\nOpenSSH 5.6 and 5.7 contain an information disclosure<br />

vulnerability which may cause the contents of the stack to be copied into an SSH<br />

certificate, which is visible to a remote attacer. This information may lead to further<br />

attacks.<br />

Solution: Upgrade to OpenSSH version 5.8 or later.<br />

CVE-2011-0539<br />

WordPress < 3.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5785 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51939<br />

Description: Synopsis : \n\nThe remote web server is hosting a web application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of WordPress is : \n<br />

%L \n\nVersions of WordPress earlier than 3.0.5 are potentially affected by multiple<br />

vulnerabilities : \n\n - The application is prone to multiple cross-site scripting<br />

vulnerabilities. An attacker can exploit these issues through the 'title' field of the<br />

'Quick/Bulk Edit' section and the 'tags meta box' section. An attacker would require Author<br />

or Contributor privileges to take advantage of this.\n\n - The application is prone to an<br />

information-disclosure vulnerability. An attacker can exploit this issue through the media<br />

uploader, disclosing posts. This information may assist in further attacks. An attacker<br />

would require Author privileges to take advantage of this.<br />

Solution: Upgrade to WordPress 3.0.5 or later.<br />

CVE-2011-0701<br />

Apache Tomcat 5.5.x < 5.5.30 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5786 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47749<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 5.x earlier than 5.5.30 are potentially affected by multiple<br />

vulnerabilities : \n\n - The 'WWW-Authenticate' HTTP header for BASIC and DIGEST<br />

authentcation may expose the local host name or IP address of the machine running<br />

Tomcat. (CVE-2010-1157)\n\n - Several flaws in the handling of the 'Tansfer-Encoding'<br />

header could prevent the recycling of buffer. (CVE-2010-2227)\n\n - When running under a<br />

<strong>Security</strong>Manager, it is possible for web applications to be granted read/write permissions to<br />

any area on the file system. (CVE-2010-3718)<br />

Solution: Upgrade to Apache Tomcat 5.5.30 or later.<br />

CVE-2010-3718<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1568

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!