27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running Microsoft Windows version: %L<br />

Solution: N/A<br />

Spotify Installed<br />

CVE Not available<br />

<strong>PVS</strong> ID: 6128 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has attempted to installed the Spotify music application.<br />

Solution: N/A<br />

CVE Not available<br />

OpenSSL 0.9.8 < 0.9.8s / 1.x < 1.0.0f Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6129 FAMILY: Web Servers RISK: HIGH NESSUS ID:57460<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of OpenSSL is : \n %L \n\nVersions of OpenSSL 0.9.8<br />

earlier than 0.9.8s, and 1.0.0 earlier than 1.0.0f are potentially affected by the following<br />

vulnerabilities :\n\n - An extension of the Vaudenay padding oracle attack exists against<br />

CBC mode encryption which enables an efficient plaintext recovery attack against the<br />

OpenSSL implementation of DTLS. (CVE-2011-4108)\n\n - If<br />

x509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy check failure can<br />

lead to a double-free. (CVE-2011-4109)\n\n - OpenSSL fails to clear the bytes used as<br />

block cipher padding in SSL 3.0 records. As a result, in each record, up to 15 bytes of<br />

uninitialized memory may be sent, encrypted, to the SSL peer. (CVE-2011-4576)\n\n -<br />

RFC 3779 data can be included in certificates, and if it is malformed, may trigger an<br />

assertion failure. This could be used in a denial-of-service attack. (CVE-2011-4577)\n\n -<br />

Support for handshake restarts for server gated cryptography (SGC) can be used in a<br />

denial-of-service attack. (CVE-2011-4619)\n\n - A malicious TLS client can send an<br />

invalid set of GOST parameters which will cause the server to crash due to a lack of error<br />

checking. (CVE-2012-0027)<br />

Solution: Upgrade to OpenSSL 0.9.8s, 1.0.0f, or later.<br />

CVE-2012-0027<br />

Successful Shell Attack Detected - Linux Failed 'cd' Command<br />

<strong>PVS</strong> ID: 6130 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: The results of a failed 'cd' command occurred in a TCP session normally used for a<br />

standard service. This may indicate a successful compromise of this service has occurred.<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1673

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!