27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2011-0228<br />

ClamAV < 0.97.2 'cli_hm_scan' Denial of Service<br />

<strong>PVS</strong> ID: 5994 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running an anti-virus application that is vulnerable to a<br />

denial of service attack.\n\nThe reported version of ClamAV on the remote host is : \n %L<br />

\n\nVersions of ClamAV earlier than 0.97.2 are potentially affected by a denial of service<br />

vulnerability. An off-by-one error exists in the 'cli_hm_scan' function in the file<br />

'libclamav/matcher-hash.c' that can be exploited by a specially crafted message causing the<br />

clamd daemon to crash.<br />

Solution: Upgrade to ClamAV 0.97.2 or later.<br />

CVE Not available<br />

phpMyAdmin 3.3.x < 3.3.10.3 / 3.4.x < 3.4.3.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5995 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is vulnerable to<br />

multiple attack vectors.\n\nFor your information, the observed version of phpMyAdmin is :<br />

\n %L \n\nVersions of phpMyAdmin 3.3.x earlier than 3.3.10.3 and 3.4.x earlier than<br />

3.4.3.2 are potentially affected by multiple vulnerabilities : \n\n - A cross-site scripting<br />

vulnerability exists in the table Print view. (PMASA-2011-9)\n\n - A local file inclusion<br />

vulnerability can be exploited via a specially crafted MIME-type transformation parameter.<br />

(PMASA-2011-10)\n\n - In the 'relational schema' code a parameter is not sanitized before<br />

being used to concatenate a class name which could lead to a local file inclusion or code<br />

execution. (PMASA-2011-11)\n\n - It is possible to manipulate the PHP superglobals<br />

(including SESSION) using some of the Swekey authentication code. (PMASA-2011-12)<br />

Solution: Upgrade to phpMyAdmin 3.3.10.3, 3.4.3.2, or later.<br />

CVE-2011-2643<br />

Apache Tomcat 7.0.x < 7.0.19 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5996 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:55759<br />

Description: Synopsis : \n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 7.0.x earlier than 7.0.19 are potentially affected by multiple<br />

vulnerabilities : \n\n - An issue exists in the error handling related to the<br />

MemoryUserDatabase that allows user passwords to be disclosed through log files.<br />

(CVE-2011-2204)\n\n - An input validation issue exists that allows a local attacker to either<br />

bypass security or carry out denial of service attacks when the APR or NIO connectors are<br />

Family Internet Services 1633

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!