27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.5 are potentially<br />

affected by a cross-site scripting vulnerability because the application uses the user<br />

supplied parameters 'sort' and 'orderBy' directly wihtout filtering.<br />

Solution: Upgrade to Apache Tomcat 7.0.5 or later.<br />

CVE-2010-4172<br />

Apache Tomcat 7.0.x < 7.0.6 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5794 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51976<br />

Description: Synopsis : \n\nThe remote web server is affected by a cross-site scripting<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.6 are potentially<br />

affected by a cross-site scripting vulnerability because the HTML Manager interface<br />

display web application provided data, such as display names, without filtering.<br />

Solution: Upgrade to Apache Tomcat 7.0.6 or later.<br />

CVE-2011-0013<br />

Apache Tomcat 7.0.x < 7.0.8 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5795 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51987<br />

Description: Synopsis : \n\nThe remote web server is affected by a denial of service<br />

vulnerability.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.8 are potentially<br />

affected by a denial of service vulnerability becasue the NIO connector expands its buffer<br />

endlessly during request line processing.<br />

Solution: Upgrade to Apache Tomcat 7.0.8 or later.<br />

CVE-2011-0534<br />

ClamAV < 0.97 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5796 FAMILY: Web Clients RISK: HIGH NESSUS ID:51935<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is vulnerable to<br />

multiple attack vectors.\n\nThe reported version of ClamAV on the remote host is : \n %L<br />

\n\nVersions of ClamAV earlier than 0.97 are potentially affected by multiple<br />

vulnerabilities : \n\n - As-yet unspecified double-free issue involving an error path exists in<br />

'libclamav/vba_extract.c' and 'shared/cdiff.c'. (Bug 2486 and report from<br />

)\n,br. - 'libclamav/pdf.c' may miss detection. (Bug 2455)\n\n - Multiple<br />

as-yet unspecified error path leaks exist in 'clamav-milter/whitelist.c', 'clamscan/manager.c'<br />

Family Internet Services 1571

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!