27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\n It is<br />

possible to make the remote IOS crash by sending malformed SIP packets. These<br />

vulnerabilities are documented as CISCO bug id CSCdz39284 and CSCdz41124.<br />

Solution: http://www.cisco.com/warp/public/707/cisco-sa-20030221-protos.shtml<br />

CVE-2003-1115<br />

IBM DB2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2252 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a IBM DB/2 Universal Database Server. It is reported that versions up to and<br />

including 8.1 are vulnerable to multiple critical vulnerabilities including multiple remote<br />

buffer overflows. Because DB/2 banners sent over the network do not include the installed<br />

FixPak number, this alert may be a false positive.<br />

Solution: Install the relevant Fixpak (Fixpak 8 for DB/2 8.1 or Fixpak 12 for DB/2 7.x) from IBM.<br />

CuteNews <<br />

CVE-2004-1372<br />

<strong>PVS</strong> ID: 2253 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17256<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS)<br />

attack.\n\nAccording to its version number, the remote host is running a version of<br />

CuteNews that allows an attacker to inject arbitrary script through the variables<br />

'X-FORWARDED-FOR' or 'CLIENT-IP' when adding a comment. On one hand, an<br />

attacker can inject a client-side script to be executed by an administrator's browser when<br />

he/she chooses to edit the added comment. On the other, an attacker with local access could<br />

leverage this flaw to run arbitrary PHP code in the context of the web server user.<br />

Additionally, it suffers from a cross-site scripting flaw involving the 'search.php' script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0645<br />

Apache < 2.0.51 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2254 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.51. It is<br />

reported that these versions of Apache are prone to a denial of service issue related to<br />

mod_ssl. An attacker may force a SSL connection to be aborted and therefore cause the<br />

Apache server to enter in an infinite loop, consuming CPU resources.<br />

Family Internet Services 565

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!