27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running a version of mod_auth_mysql which is older than 1.10. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_pg 1.10 or higher.<br />

CVE-2001-1379<br />

Apache mod_auth_oracle < 0.52 SQL Injection<br />

<strong>PVS</strong> ID: 1493 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Description: The remote host is running a version of mod_auth_oracle which is older than 0.5.2. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_oracle 0.5.2 or higher.<br />

CVE-2001-1379<br />

Apache mod_auth_pgsql_sys < 0.9.5 SQL Injection<br />

<strong>PVS</strong> ID: 1494 FAMILY: Web Servers RISK: HIGH NESSUS ID:10752<br />

Description: The remote host is running a version of mod_auth_pgsql_sys which is older than 0.9.5. It is<br />

vulnerable to a SQL injection attack which may let anyone bypass authentication or even<br />

modify your database.<br />

Solution: Upgrade to mod_auth_pgsql_sys 0.9.5 or higher.<br />

CVE-2001-1379<br />

Apache Chunked Encoding Remote Overflow / DoS<br />

<strong>PVS</strong> ID: 1495 FAMILY: Web Servers RISK: HIGH NESSUS ID:11030<br />

Description: The remote host is running a version of Apache which is vulnerable to a chunked encoding<br />

vulnerability. An attacker may use this flaw to gain a shell on this host.<br />

Solution: Upgrade to Apache 1.3.26, 2.0.39 or higher.<br />

CVE-2002-0392<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache-SSL < 1.47 mod_ssl i2d_SSL_SESSION Function Overflow<br />

<strong>PVS</strong> ID: 1496 FAMILY: Web Servers RISK: HIGH NESSUS ID:10918<br />

Description: The remote host is using a version of Apache-SSL which is older than 1.47. This version is<br />

vulnerable to a buffer overflow which may allow an attacker to execute arbitrary<br />

commands on this host.<br />

Family Internet Services 385

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!