27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

attack vectors.\n\nThe remote host is running the Opera web browser. For your<br />

information, the observed version of Opera is : \n %L \n\nVersions of Opera earlier than<br />

11.62 are potentially affected by multiple vulnerabilities :\n\n - Small windows can be used<br />

to trick users in to executing downloads. (Issue 1010)\n\n - Overlapping content can trick<br />

users into executing downloads. (Issue 1011)\n\n - History.state can leak the state data from<br />

cross domain pages. (Issue 1012)\n\n - Web page dialogs can be used to display the wrong<br />

address in the address field. (Issue 1013)\n\n - Carefully timed reloads and redirects can<br />

spoof the address field. (Issue 1014)<br />

Solution: Upgrade to Opera 11.62 or later.<br />

CVE Not available<br />

OpenSSL 0.9.8 < 0.9.8u / 1.0.0 < 1.0.0h Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6400 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:58565<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nFor your<br />

information, the observed version of OpenSSL is : \n %L \n\nOpenSSL versions earlier<br />

than 0.9.8u and 1.0.0h are potentially affected by multiple vulnerabilities :\n\n - A NULL<br />

pointer dereference flaw exists in mime_param_cmp. A specially crafted S/MIME input<br />

header could cause an application to crash during S/MIME message verification or<br />

decryption. (CVE-2012-1165)\n\n - A weakness in the OpenSSL CMS and PKCS 7 code<br />

can be exploited using Bleichenbacher's attack on PKCS 1 v1.5 RSA padding. Note that<br />

only users of CMS, PKCS 7, or S/MIME decryption operations are affected.<br />

Solution: Upgrade to OpenSSL 0.9.8u, 1.0.0h, or later.<br />

CVE-2012-1165<br />

Apache Traffic Server < 3.0.4 / 3.1.3 Buffer Overflow Vulnerability<br />

<strong>PVS</strong> ID: 6401 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote caching server is affected by a heap-based buffer overflow<br />

vulnerability.\n\nApache Traffic Server, an open source caching server, is installed on the<br />

remote host. For your information, the observed version of Apache Traffic Server installed<br />

on the remote host is :\n %L \n\n Versions of Apache Traffic Server earlier than 3.0.4 or<br />

3.1.x earlier than 3.1.3 are potentially affected by a heap-based buffer overflow<br />

vulnerability when handling malicious HTTP host headers. By exploiting this flaw, a<br />

remote, unauthenticated attacker could execute arbitrary code on the remote host subject to<br />

the privileges of the user running the affected service.<br />

Solution: Upgrade to Apache Traffic Server 3.0.4, 3.1.3, or later.<br />

CVE-2012-0256<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Google Chrome < 18.0.1025.142 Multiple Vulnerabilities<br />

Family Internet Services 1749

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!