27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1657<br />

Cerbere Proxy Server Long Host Header Field Overflow DoS<br />

<strong>PVS</strong> ID: 2194 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Cerbere Proxy Server, a HTTP/FTP proxy server for Windows operating systems.<br />

It is reported that versions up to and including 1.2 are vulnerable to a remote denial of<br />

service in the 'Host:' HTTP field processing. An attacker may craft a malicious HTTP<br />

request with a large 'Host:' field to deny service to legitimate users.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

<strong>PVS</strong> ID: 2195 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10973<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system appears to be vulnerable to a flaw in IOS when the<br />

keyword 'established' is being used in the ACLs. This bug can, under very specific<br />

circumstances and only with certain IP host implementations, allow unauthorized packets<br />

to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi34061.<br />

Solution: http://www.cisco.com/warp/public/707/2.html<br />

CVE-1999-0162<br />

Cisco IOS ACL Bypass (Bug ID CSCdi34061)<br />

<strong>PVS</strong> ID: 2196 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10973<br />

Description: Synopsis :\n\nThe remote host may allow unauthorized traffic to pass, despite configured<br />

access controls.\n\n The remote system seems to be vulnerable to a flaw in IOS when the<br />

keyword 'established' is being used in the ACLs. This bug can, under very specific<br />

circumstances and only with certain IP host implementations, allow unauthorized packets<br />

to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID<br />

CSCdi34061.<br />

Solution: http://www.cisco.com/warp/public/707/2.html<br />

CVE-1999-0162<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 549

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!