27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 1509 FAMILY: Web Servers RISK: HIGH NESSUS ID:11303<br />

Description: The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are<br />

vulnerable to a buffer overflow which may allow an attacker to gain root access on this<br />

host. *** Note that it is not possible to remotely determine the version of mod_frontpage<br />

which is running, so this may be a false positive.<br />

Solution: Upgrade to mod_frontpage 1.6.1 or higher.<br />

CVE-2002-0427<br />

Apache mod_jk < 1.2.1 Chunked Encoding DoS<br />

<strong>PVS</strong> ID: 1510 FAMILY: Web Servers RISK: HIGH NESSUS ID:11519<br />

Description: The remote Apache server is running a version of mod_jk which is vulnerable in the way it<br />

processes chunked encoded requests. This may allow an attacker to desynchronise Apache<br />

and Tomcat which would prevent this host from running properly.<br />

Solution: Upgrade to mod_jk 1.2.1 or higher.<br />

CVE-2002-2272<br />

Apache mod_python < 2.7.8 Imported Function Access<br />

<strong>PVS</strong> ID: 1511 FAMILY: Web Servers RISK: HIGH NESSUS ID:10947<br />

Description: The remote Apache server is running a version of mod_python which is older than 2.7.6.<br />

This version contains a bug which may allow an attacker to execute potentially harmful<br />

python function even though he should not have the privileges to do so.<br />

Solution: Upgrade to mod_python 2.7.8 or higher.<br />

CVE-2002-0185<br />

Apache mod_ssl < 2.8.10 Off-by-one Overflow<br />

<strong>PVS</strong> ID: 1512 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11039<br />

Description: The remote Apache server is running a version of mod_ssl which contains a off-by-one<br />

buffer overflow. An attacker with write access to a .htacess file could exploit this bug to<br />

execute arbitrary code on this host with the privileges the web server is running.<br />

Solution: Upgrade to mod_ssl 2.8.10 or higher.<br />

CVE-2002-0653<br />

Apache mod_ssl Session Cache Code Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 1513 FAMILY: Web Servers RISK: HIGH NESSUS ID:10888<br />

Family Internet Services 389

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!