27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Apache Tomcat 6.0.x < 6.0.33 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6018 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56008<br />

Description: Synopsis : \n\nThe remote web server is vulnerable to multiple attack vectors.\n\nFor your<br />

information, the observed version of Apache Tomcat installed on the remote host is : \n %L<br />

\n\nVersions of Tomcat 6.x earlier than 6.0.33 are potentially affected by multiple<br />

vulnerabilities : \n\n - An error handling issue exists related to the MemoryUserDatabase<br />

that allows user passwords to be disclosed through log files. (CVE-2011-2204)\n\n - An<br />

input validation error exists that allows a local attacker to either bypass security or carry out<br />

denial of service attacks when the APR or NIO connectors are enabled.<br />

(CVE-2011-2526)\n\n - A component that Apache Tomcat relies on called 'jsvc' contains an<br />

error in that it does not drop capabilities after starting and can allow access to sensitive files<br />

owned by the super user. Note this vulnerability only affects Linux operating systems and<br />

only when the following are true: jsvc is compiled with libpcap and the '-user' parameter is<br />

used. (CVE-2011-2729)<br />

Solution: Upgrade to Apache Tomcat 6.0.33 or later.<br />

CVE-2011-2729<br />

Opera < 11.51 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6019 FAMILY: Web Clients RISK: HIGH NESSUS ID:56042<br />

Description: Synopsis : \n\nThe remote host has a web browser installed that is affected by a memory<br />

corruption vulnerability.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.51 are potentially affected by multiple vulnerabilities : \n\n - Unsecured web content<br />

could appear secure. (Issue 1000)\n\n - An unspecified issue.<br />

Solution: Upgrade to Opera 11.51 or later.<br />

CVE-2011-3389<br />

Google Chrome < 13.0.782.218 Out of Date CA List<br />

<strong>PVS</strong> ID: 6020 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:56023<br />

Description: Synopsis :\n\nThe remote host contains a web browser that uses an out of date certificate<br />

authority list.\n\nFor your information, the observed version of Google Chrome is<br />

\n%L\n\nVersions of Google Chrome earlier than 13.0.782.218 use an out of date<br />

certificate authority list. Due to the issuance of several fraudulent SSL certificates, the<br />

certificate authority DigiNotar has been disabled in Google Chrome.<br />

Solution: Upgrade to Google Chrome 13.0.782.218 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1642

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!