27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to SeaMonkey 2.7.2 or later.<br />

CVE-2011-3026<br />

7T-IGSS Server Detected (SCADA)<br />

<strong>PVS</strong> ID: 6330 FAMILY: SCADA RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a 7T Interactive Graphical SCADA System(IGSS) used to control and<br />

monitor programmable logic controllers(PLC) in industrial processes. The following<br />

version was detected: %L.<br />

Solution: Restrict access to the server to authorized personnel only. As well ensure that the product is<br />

up to date on all of its security patches.<br />

CVE Not available<br />

Apache Tomcat 5.5.x < 5.5.35 Hash Collision Denial of Service<br />

<strong>PVS</strong> ID: 6331 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:57540<br />

Description: Synopsis :\n\nThe remote web server is affected by a denial of service vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 5.x earlier than 5.5.35 are potentially affected by a denial of<br />

service vulnerability. Large numbers of crafted form parameters can cause excessive CPU<br />

consumption due to hash collisions.<br />

Solution: Upgrade to Apache Tomcat 5.5.35 or later.<br />

CVE-2012-0022<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache Tomcat 6.0.x < 6.0.35 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6332 FAMILY: Web Servers RISK: HIGH NESSUS ID:57080<br />

Description: Synopsis :\n\nThe remote web server is affected by a denial of service vulnerability.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Apache Tomcat 6.0.35 are potentially affected by multiple<br />

vulnerabilities :\n\n - Specially crafted requests are incorrectly processed by Tomcat and<br />

can cause the server to allow injection of arbitrary AJP messages. This can lead to<br />

authentication bypass and disclosure of sensitive information. Note this vulnerability only<br />

occurs when the following are true (CVE-2011-3190):\n\n - the<br />

org.apache.jk.server.JkCoyoteHandler AJP connector is not used.\n - POST requests are<br />

accepted.\n - Large numbers of crafted form parameters can cause excessive CPU<br />

consumption due to hash collisions. (CVE-2011-4858, CVE-2012-0022)\nIAVB Reference<br />

: 2012-B-0035\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Apache Tomcat 6.0.35 or later.<br />

Family Internet Services 1730

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!