27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web server is affected by a remote denial of service<br />

vulnerabily.\n\nFor your information, the observed version of Apache Tomcat installed on<br />

the remote host is : \n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.28 are potentially<br />

affected by a remote denial of service vulnerability:\n\n - A flaw exists within the<br />

parseHeaders() function that could allow for a crafted header to cause a remote denial of<br />

service (CVE-2012-2733)\n\n - An error exists related to the 'NIO' connector when HTTPS<br />

and 'sendfile' are enabled that can force the application into an infinite loop.<br />

(CVE-2012-4534)<br />

Solution: Upgrade to Apache Tomcat 7.0.28 or later.<br />

CVE-2012-4534<br />

Apache Tomcat 7.0.x < 7.0.30 DIGEST Authentication Multiple <strong>Security</strong> Weaknesses<br />

<strong>PVS</strong> ID: 6624 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:62988<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple security weaknesses.\n\nFor<br />

your information, the observed version of Apache Tomcat installed on the remote host is :<br />

\n %L \n\nVersions of Tomcat 7.0.x earlier than 7.0.30 are potentially affected by the<br />

following vulnerabilities:\n\n - Replay-countermeasure functionality in HTTP Digest<br />

Access Authentication tracks cnonce values instead of nonce values, which makes it easier<br />

for attackers to bypass access restrictions by sniffing the network for valid requests.<br />

(CVE-2012-5885)\n\n - HTTP Digest Access Authentication implementation caches<br />

information about the authenticated user, which could potentially allow an attacker to<br />

bypass authentication via session ID. (CVE-2012-5886)\n\n - HTTP Digest Access<br />

Authentication implementation does not properly check for stale nonce values with<br />

enforcement of proper credentials, which allows an attacker to bypass restrictions by<br />

sniffing requests. (CVE-2012-5887)<br />

Solution: Upgrade to Apache Tomcat 7.0.30 or later.<br />

Mozilla Firefox 16.x <<br />

CVE-2012-5887<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 6625 FAMILY: Web Clients RISK: HIGH NESSUS ID:62998<br />

Description: Synopsis :\n\nThe remote host has a web browser installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Firefox is : \n %L<br />

\n\nVersions of Firefox 16.x are potentially affected by the following security issues :\n\n -<br />

Several memory safety bugs exist in the browser engine used in Mozilla-based products<br />

that could be exploited to execute arbitrary code. (CVE-2012-5842, CVE-2012-5843)\n\n -<br />

An error exists in the method 'image::RasterImage::DrawFrameTo' related to GIF images<br />

that could allow a heap-based buffer overflow, leading to arbitrary code execution.<br />

(CVE-2012-4202)\n\n - An error exists related to SVG text and CSS properties that could<br />

lead to application crashes. (CVE-2012-5836)\n\n - A bookmarked, malicious 'javascript:'<br />

URL could allow execution of local executables. (CVE-2012-4203)\n\n - The JavaScript<br />

function 'str_unescape' could allow arbitrary code execution. (CVE-2012-4204)\n\n -<br />

Family Internet Services 1818

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!