27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HP <strong>Network</strong> Node Manager i (NNMi) Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5905 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host contains a web application that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host contains HP <strong>Network</strong> Node Manager i, a fault<br />

management application.\n\nFor your information, the observed version of HP <strong>Network</strong><br />

Node Manager i is : \n %L \n\nVersions of HP <strong>Network</strong> Node Manager i earlier than<br />

9.01.003 are potentially affected by multiple issues : \n\n - An unspecified vulnerability<br />

allows local users to read arbitrary files via unknown vectors. (CVE-2011-0897)\n\n - A<br />

cross-site scripting vulnerability exists. (CVE-2011-0898)<br />

Solution: Apply the patch supplied by HP.<br />

CVE-2011-0898<br />

IBM Solid Database < 4.5.182 / 6.0.1069 / 6.3.49 / 6.5.0.4 Denial of Service Vulnerability<br />

<strong>PVS</strong> ID: 5906 FAMILY: Database RISK: HIGH NESSUS ID:53812<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to a remote code execution<br />

attack.\n\nThe remote host is running IBM solidDB. For your information, the observed<br />

version of solidDB is :%L.\n\nVersions of solidDB earlier than 4.5.182, 6.0.x earlier than<br />

6.0.1069, 6.3.x earlier than 6.3 Fix Pack 8, and 6.5.x earlier than 6.5.0.4 are potentially<br />

affected by a denial of service vulnerability due to a flaw in the way the application handles<br />

the rpc_test_svc_readwrite and rpc_test_svc_done commands. A remote unauthenticated<br />

attacker, exploiting this flaw, could crash the affected host.<br />

Solution: Upgrade to IBM solidDB 4.5.182, 6.0.1069, 6.3 Fix Pack 8, 6.5 Fix Pack 4, or later.<br />

CVE-2011-1208<br />

Novell File Reporter Agent XML Parsing Remote Code Execution<br />

<strong>PVS</strong> ID: 5907 FAMILY: Generic RISK: HIGH NESSUS ID:53536<br />

Description: Synopsis : \n\nThe remote host contains a service that is vulnerable to a remote buffer<br />

overflow attack.\n\nNovell File Reporter Agent, a tool for identifying files stored on the<br />

network, is installed on the remote host. For your information, the observed version of<br />

Novell File Reporter Agent is : \n %L \n\nVersions of Novell File Reporter Agent earlier<br />

than 1.0.4.2 are potentially affected by a buffer overflow vulnerability because the service,<br />

which listens by default on TCP port 3037, blindly copies user-supplied data into a<br />

fixed-length buffer on the stack when handling the contents of an XML tag. An<br />

unauthenticated remote attacker who can access the agent service can leverage this issue to<br />

execute arbitrary code under the context of the user running the affected application.<br />

Solution: Upgrade to Novell File Reporter 1.0.2, which includes NFR Agent version 1.0.4.2.<br />

CVE-2011-0994<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1606

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!