27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host allows remote attackers to determine physical file<br />

layout.\n\nThe remote Jakarta Tomcat server reveals the physical path of the remote<br />

webroot when asked for a .jsp file using a specially crafted request. An attacker may use<br />

this flaw to gain further knowledge about the remote system layout.<br />

Solution: Upgrade to Tomcat 3.2.1 or higher.<br />

CVE-2000-0759<br />

Apache Tomcat < 3.3.1a Directory Listing and File Disclosure<br />

<strong>PVS</strong> ID: 1466 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11438<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks\n\nApache Tomcat (prior to 3.3.1a) is prone to a directory listing and file disclosure<br />

vulnerability. An attacker may exploit this bug to get the listing of directories otherwise<br />

protected by an index.html file, or even to get the source code of the remote .jsp scripts.<br />

Solution: Upgrade to Tomcat 3.3.1a or higher.<br />

CVE-2003-0042<br />

Apache Tomcat < 3.3.1a Servlet Engine MS/DOS Device Name DoS<br />

<strong>PVS</strong> ID: 1467 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11150<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt may<br />

be possible the freeze or crash the remote Tomcat web server by making it read MS/DOS<br />

devices files through its servlet engine (ie: /examples/servlet/AUX).<br />

Solution: Upgrade to Tomcat 3.3.1a or higher.<br />

CVE-2003-0045<br />

thttpd < 2.20 ssi Servlet Traversal File Access<br />

<strong>PVS</strong> ID: 1468 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10523<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows attackers to retrieve<br />

sensitive files.\n\nThe remote web server (thttpd) allows an attacker to read arbitrary files<br />

on this host, by exploiting a weakness in an included ssi package, in prepending %2e%2e/<br />

to the pathname (as in GET /cgi-bin/ssi//%2e%2e/%2e%2e/etc/passwd).<br />

Solution: Upgrade to thttpd 2.20 or higher.<br />

CVE-2000-0900<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 378

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!