27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis:\n\nThe remote web server is affected by an access restriction bypass<br />

vulnerability.\n\nThe remote host is running a nginx HTTP server. For your information,<br />

the observed version of nginx is:\n %L \n\n Versions earlier than 1.2.1(stable version) or<br />

versions earlier than 1.3.1(development version) are vulnerable to an access restriction<br />

bypass vulnerability.\nBy using a request with a specially crafted directory name, such as<br />

'/directory::$index_allocation' in place of '/directory', an attacker may be able to bypass<br />

access restrictions.\nNote that this vulnerability only affects installs on Windows.<br />

(CVE-2012-4963)<br />

Solution: Upgrade to nginx 1.2.1(stable version) or 1.3.1(development version) or later.<br />

CVE-2011-4963<br />

PHP 5.4.x < 5.4.5 _php_sream_scandir Overflow<br />

<strong>PVS</strong> ID: 6530 FAMILY: Web Servers RISK: HIGH NESSUS ID:60086<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by an overflow<br />

vulnerability.\n\nFor your information, the version of PHP installed on the remote host is<br />

:\n %L \n\nPHP versions earlier than 5.4.5 are affected by the following vulnerabilities.\n\n<br />

- An unspecified overflow vulnerability in the function '_php_stream_scandir' in the file<br />

'main/streams/streams.c'\n<br />

Solution: Upgrade to PHP version 5.4.5 or later.<br />

CVE-2012-2688<br />

Android Mobile Device App Download Detection<br />

<strong>PVS</strong> ID: 6531 FAMILY: Mobile Devices RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an Android mobile client which has just downloaded the following<br />

software : %L<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Detection of uploading a file to scribd.com - (HTML method)<br />

<strong>PVS</strong> ID: 6532 FAMILY: Internet Services RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host has uploaded a file to scribd.com via their HTML uploader. Scridb is the<br />

world's largest online library where one can share, view, and dowload documents across<br />

web and mobile clients.<br />

Solution: Ensure that such usage is in aligment with Corporate policy<br />

Family Internet Services 1786

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!