27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 2175 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.48. This<br />

version is vulnerable to a bug that may allow a rogue CGI to disable the httpd service by<br />

issuing over 4K of data to stderr. To exploit this flaw, an attacker would need the ability to<br />

upload a rogue CGI script to this server and to have it executed by the Apache daemon<br />

(httpd).<br />

Solution: Upgrade to version 2.0.48 or higher.<br />

CVE-2004-0092<br />

Argosoft HTTP GET Request Saturation Remote DoS<br />

<strong>PVS</strong> ID: 2176 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11734<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Argosoft. This version is reported prone to a denial of service. It is possible to kill<br />

the remote HTTP server by sending an invalid request to it ('GET /index.html\n\n'). An<br />

attacker may exploit this vulnerability to make a web server crash continually or even<br />

execute arbitrary code on a system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

BadBlue < 2.3 ISAPI Module Remote Administrative Interface Access<br />

<strong>PVS</strong> ID: 2177 FAMILY: Web Servers RISK: HIGH NESSUS ID:11641<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote BadBlue web server has a bug in the way its security<br />

functions are performed that may allow attackers to gain administrative control of this host.<br />

Solution: Upgrade to version 2.3 or higher.<br />

CVE Not available<br />

CommuniGatePro < 4.1b2 Session Token Disclosure<br />

<strong>PVS</strong> ID: 2178 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11567<br />

Description: Synopsis :\n\nThe remote host may allow an attacker to gain unauthorized access to a user's<br />

email.\n\nThe remote CommuniGatePro, according to its version number, is vulnerable to a<br />

flaw that may allow an attacker access the mailboxes of its victims. To exploit such a flaw,<br />

the attacker needs to send an email to a victim with a link to an image hosted on a rogue<br />

server that will store the Referer field sent by the user-agent that contains the credentials<br />

used to access the victim's mailbox.<br />

Family Internet Services 544

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!