27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2011-0013<br />

Apache Tomcat 6.0.x < 6.0.32 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5790 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51987<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 6.x earlier than 6.0.32 are potentially affected by a denial of<br />

service vulnerability because the NIO connector expands its buffer endlessly during request<br />

line processing.<br />

Solution: Upgrade to Apache Tomcat 6.0.32 or later.<br />

CVE-2011-0534<br />

Apache Tomcat 7.0.x < 7.0.2 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5791 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to a denial of service attack.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.2 are potentially affected by a denial of<br />

service vulnerability because several flaws in the handling of the 'Transfer-Encoding header<br />

could prevent the recycling of a buffer.<br />

Solution: Upgrade to Apache Tomcat 7.0.2 or later.<br />

CVE-2010-2227<br />

Apache Tomcat 7.0.x < 7.0.4 File Permission Bypass Vulnerability<br />

<strong>PVS</strong> ID: 5792 FAMILY: Web Servers RISK: LOW NESSUS ID:51958<br />

Description: Synopsis : \n\nThe remote web server is affected by a security bypass vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.4 are potentially affected by a security<br />

bypass vulnerability. When running under a <strong>Security</strong>Manager, it is possible to grant a web<br />

application read/write permissions to any area on the file system.<br />

Solution: Upgrade to Apache Tomcat 7.0.4 or later.<br />

CVE-2010-3718<br />

Apache Tomcat 7.0.x < 7.0.5 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5793 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51526<br />

Family Internet Services 1570

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!