27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: http://docs.info.apple.com/article.html?artnum<br />

CVE-2004-0823<br />

Serv-U FTP Server < 5.2.0.1 'STOU' Command Remote DoS<br />

<strong>PVS</strong> ID: 2275 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Serv-U FTP server. There is a bug in the way this version handles<br />

the 'STOU' command, which is used to send files to a remote server. It is reported that<br />

Serv-U FTP server will crash if it receives certain 'STOU' requests. An attacker may<br />

connect to the remote server and issue a 'STOU' request to deny service to legitimate users.<br />

Solution: Upgrade to version 5.2.0.1 or higher.<br />

CVE-2004-1675<br />

Apache < 2.0.51 mod_ssl Rewrite Rules DoS<br />

<strong>PVS</strong> ID: 2276 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running a version of Apache 2.x that is older than 2.0.51. It is<br />

reported that these versions of Apache are prone to a denial of service issue related to<br />

mod_ssl. An attacker may deny service to legitimate users if the remote server uses a<br />

'RewriteRule' to enable reverse proxying to a SSL origin server.<br />

Solution: Upgrade to version 2.0.51 or higher.<br />

CVE-2004-0751<br />

Oracle <strong>Security</strong> Alert #68<br />

<strong>PVS</strong> ID: 2277 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host appears to be running a vulnerable version of Oracle Database Server. It is<br />

reported that Oracle Database Server version 8.1.7, 9.0.1.4, 9.0.1.5, 9.0.4, 9.2.0.4, 9.2.0.5<br />

and 10.1.0.2 are prone to multiple vulnerabilities including buffer overflow issues, PL/SQL<br />

injection, trigger abuse, character set conversion bugs and denial of service issues. An<br />

attacker may exploit these vulnerabilities to deny service to legitimate users or to execute<br />

arbitrary code on the remote server.<br />

Solution: Download and install the relevant patch from Oracle.<br />

CVE-2004-0638<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PerlDesk < 2 pdesk.cgi lang Parameter Traversal Server-Side Script Execution<br />

Family Internet Services 572

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!