27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Configure your web server or application to use the 'HttpOnly' tag.<br />

CVE Not available<br />

Web Server CSS Hosted on 3rd-party Server<br />

<strong>PVS</strong> ID: 5800 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server utilizes Cascading Style Sheets (CSS) on it's pages. Further, the<br />

web server seems to be using CSS from an external source. This can be a risk in that script<br />

code can be embedded within the CSS which would potentially execute within the user<br />

browser. The source of the CSS is: \n %L \n\nThe CSS is embedded within the following<br />

web document: \n%P<br />

Solution: Ensure that loading client-side CSS from a 3rd party is authorized with respect to policies<br />

and guidelines.<br />

CVE Not available<br />

Web Site Cross-Domain Policy File Detection<br />

<strong>PVS</strong> ID: 5801 FAMILY: Policy RISK: INFO NESSUS ID:32318<br />

Description: The remote web server contains a 'crossdomain.xml' file. This is a simple XML file used by<br />

Adobe's Flash Player to allow access to data that resides outside the exact web domain from<br />

which a Flash movie file originated. The source of the XML file is: \n %L \n\nThe file can<br />

be found at : %P<br />

Solution: Review the contents of the policy file carefully. Improper policies, especially an<br />

unrestricted one with just '*', could allow for cross-site request forgery and cross-site<br />

scripting attacks against the web server.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Asterisk main/udptl.c Buffer Overflows (AST-2011-002)<br />

<strong>PVS</strong> ID: 5802 FAMILY: Generic RISK: HIGH NESSUS ID:52157<br />

Description: Synopsis : \n\nThe remote VoIP server is affected by multiple buffer overflow<br />

vulnerabilities.\n\nFor your information, the observed version of Asterisk is : \n %L<br />

\n\nThe version of Asterisk running on the remote host may be vulnerable to heap- and<br />

stack-buffer overflow attacks with specially crafted UDPTL packets.\n\nSuccessful<br />

exploitation requires T.38 support to be enabled on the target, which is not the default, and<br />

can allow execution of arbitrary code in the context of the Asterisk server or an application<br />

crash.<br />

Solution: Upgrade to Asterisk 1.4.39.2, 1.6.1.22, 1.6.2.16.2, 1.8.2.4, or later or Asterisk Business<br />

Edition C.3.6.3 or later.\nAlternatively, disable T.38 support by setting 't38pt_udptl' to 'no'<br />

in sip.conf and ensuring that the chan_ooh323 module is not loaded.<br />

Family Internet Services 1573

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!