27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to nginx 1.0.10 or later.<br />

CVE-2011-4315<br />

nginx < 1.0.14 / 1.1.x < 1.1.17 Information-Disclosure<br />

<strong>PVS</strong> ID: 6457 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\nThe remote host is running a nginx HTTP server. For your information,<br />

the observed version of nginx is:\n %L \n\n Versions earlier than 1.0.14(stable version) or<br />

versions earlier than 1.1.17(development version) are vulnerable to an<br />

information-disclosure vulnerability, when handling specially crafted HTTP responses.<br />

Attackers can exploit this issue to disclose the content of the previously freed memory.<br />

(CVE-2012-1180)\n<br />

Solution: Upgrade to nginx 1.0.14(stable version) or 1.1.17(development version) or later.<br />

CVE-2012-1180<br />

nginx < 1.0.15 / 1.1.x < 1.1.19 Buffer-Overflow Vulnerability<br />

<strong>PVS</strong> ID: 6458 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis:\n\nThe remote web server is affected by a buffer-overflow vulnerability.\n\n The<br />

remote host is running a nginx HTTP server. For your information, the observed version of<br />

nginx is:\n %L \n\n Versions earlier than 1.0.15(stable version) or versions earlier than<br />

1.1.19(development version) are vulnerable to a buffer-overflow vulnerability because it<br />

fails to perform adequate checks on user-supplied input. An attacker can exploit this issue<br />

by using a specially-crafted mp4 file, allowing the attacker to execute arbitrary code in the<br />

context of the application. (CVE-2012-2089)\n<br />

Solution: Upgrade to nginx 1.0.15(stable version) or 1.1.19(development version) or later.<br />

TeamViewer Detection<br />

CVE-2012-2089<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6459 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running TeamViewer, an application for managing machines remotely.<br />

TeamViewer relies on the host computer (usually behind a firewall) initiating an outbound<br />

connection. Given this, TeamViewer can subvert firewall rules by allowing direct access to<br />

an internal machine from untrusted networks. The version of TeamViewer is %L<br />

Solution: Ensure that this application is authorized for your network<br />

Family Internet Services 1763

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!