27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CGI was not tested for.<br />

Solution: Remove the CGI mapped behind the /search URL<br />

CVE Not available<br />

StrongHold < 3.0 build 3015 System File Disclosure<br />

<strong>PVS</strong> ID: 1473 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10803<br />

Description: The remote web server (RedHat StrongHold Web server) allows anyone to disclose<br />

sensitive system files, including httpd.conf, by requesting the URLs /stronghold-info and<br />

/stronghold-status. An attacker may use this flaw to gain a better intimate knowledge about<br />

the remote host and make more focused attacks.<br />

Solution: Upgrade to version 3.0 build 3015 or higher.<br />

CVE-2001-0868<br />

StrongHold < 3.0 build 3015 File System Disclosure<br />

<strong>PVS</strong> ID: 1474 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10803<br />

Description: The remote web server (RedHat StrongHold Web server) allows anyone to disclose<br />

sensitive system files, including httpd.conf, by requesting the URLs /stronghold-info and<br />

/stronghold-status. An attacker may use this flaw to gain a better intimate knowledge about<br />

the remote host and make more focused attacks.<br />

Solution: Upgrade to version 3.0 build 3015 or higher.<br />

CVE-2001-0868<br />

Abyss Web Server < 1.1.4 HTTP GET Header Remote DoS<br />

<strong>PVS</strong> ID: 1475 FAMILY: Web Servers RISK: HIGH NESSUS ID:11521<br />

Description: The remote Abyss web server can be disabled remotely by an attacker by sending a<br />

malformed HTTP request.<br />

Solution: Upgrade to Abyss 1.1.4 or higher.<br />

CVE-2003-1364<br />

PHP < 4.2.2 Malformed POST Requests<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1476 FAMILY: Web Servers RISK: HIGH NESSUS ID:11050<br />

Family Internet Services 380

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!