27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 6492 FAMILY: Backdoors RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is infected with a backdoor\n\nThe remote host appears to<br />

be infected with the Flame worm. This worm uses a multitude of exploit modules to gather<br />

information and exploit local machines.<br />

realtime<br />

Solution: The machine must be manually cleaned<br />

CVE Not available<br />

Game - Smurf's Village Detected<br />

<strong>PVS</strong> ID: 6493 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is accessing the Smurf's Village game.<br />

Solution: Ensure this application meets corporate guidelines for employee use.<br />

CVE Not available<br />

PHP 5.3.x < 5.3.13 CGI Query String Code Execution<br />

<strong>PVS</strong> ID: 6494 FAMILY: Web Servers RISK: HIGH NESSUS ID:59088<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a code<br />

execution vulnerability.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions earlier than 5.3.13 are affected by a code execution<br />

vulnerability.\n\n The fix for CVE-2012-1823 does not completely correct the CGI query<br />

vulnerability. Disclosure of PHP source code and code execution via query paramenters are<br />

still possible.\n\nNote that his vulnerability is exploitable only when PHP is used by<br />

CGI-based configurations. Apache with 'mod-php' is not an exploitable configuration.<br />

Solution: Upgrade to PHP version 5.3.13 or later.<br />

CVE-2012-2336<br />

PHP 5.3.x < 5.4.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6495 FAMILY: Web Servers RISK: HIGH NESSUS ID:58988<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by a code<br />

execution vulnerability.\n\nFor your information, the version of PHP installed on the<br />

remote host is :\n %L \n\nPHP versions earlier than 5.4.3 are affected by the following<br />

vulnerabilities.\n\n - The fix for CVE-2012-1823 does not completely correct the CGI<br />

query parameter vulnerability. Disclosure of PHP source code and code execution via query<br />

paramenters are still possible. Note that his vulnerability is exploitable only when PHP is<br />

used by CGI-based configurations. Apache with 'mod-php' is not an exploitable<br />

configuration. (CVE-2012-2311, CVE-2012-2335, CVE-2012-2336)\n\n - An unspecified<br />

buffer overflow exists related to the function 'apache_request_headers'. (CVE-2012-2329)<br />

Family Internet Services 1773

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!