27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running 4D WebStar Web Server. The remote server is vulnerable to two issues:<br />

an attacker may be able to obtain the listing of a directory by appending a star (*) to the<br />

directory name and an attacker may obtain the file php.ini by directly requesting<br />

/cgi-bin/php.ini<br />

Solution: Upgrade to 4D WebStar 5.3.3 or higher.<br />

CVE-2004-0696<br />

Abyss < 1.1.6 httpd GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2172 FAMILY: Web Servers RISK: HIGH NESSUS ID:11784<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Abyss<br />

Web server is vulnerable to a buffer overflow that may be exploited by an attacker to<br />

execute arbitrary code on this host.<br />

Solution: Upgrade to Abyss 1.1.6 or higher.<br />

CVE-2003-1337<br />

Apache < 1.3.28 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2173 FAMILY: Web Servers RISK: HIGH NESSUS ID:11793<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache that is older than 1.3.28 There are<br />

several flaws in this version, which may allow an attacker to disable the remote server.<br />

Solution: Upgrade to version 1.3.28 or higher.<br />

CVE-2002-0061<br />

Apache < 1.3.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2174 FAMILY: Web Servers RISK: HIGH NESSUS ID:11915<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote<br />

host appears to be running a version of Apache which is older than 1.3.29 There<br />

are several flaws in this version that may allow an attacker to possibly execute<br />

arbitrary code through mod_alias and mod_rewrite.<br />

Solution: Upgrade to version 1.3.29 or higher.<br />

CVE-2003-0542<br />

Apache < 2.0.48 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 543

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!