27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Mozilla Error Reporting Version Check<br />

<strong>PVS</strong> ID: 2285 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host has just sent an error report to Mozilla.org. According to the Mozilla error<br />

message, the remote host is running Mozilla version %L<br />

Solution: Ensure that this reporting is in alignment with existing corporate policies and standards.<br />

CVE Not available<br />

PHP Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2286 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14770<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote web<br />

server is configured to be PHP-enabled. It is reported that versions of PHP up to 5.0.2 and<br />

4.3.9 are prone to a file upload vulnerability. An attacker may upload an arbitrary file on<br />

the web server in the context of the PHP application. For your information, the server is<br />

running PHP version: \n %L<br />

Solution: Upgrade to version 4.3.9, 5.0.2 or higher.<br />

CVE Not available<br />

Mozilla-based Web Browser Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2287 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a Mozilla-based web browser. It is reported that web browsers based<br />

on versions of Mozilla up to and including 1.7.2 are prone to multiple vulnerabilities<br />

including overflows and cross-site scripting issues. An attacker may execute arbitrary code<br />

remotely, steal cookie-based authentication credentials or gather intelligence about the host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0908<br />

Mozilla / Mozilla Thunderbird Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2288 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Mozilla or Mozilla Thunderbird mail client. It is reported<br />

that this version of Mozilla or Mozilla Thunderbird is vulnerable to several flaws that may<br />

allow an attacker to execute arbitrary code on the remote host. To exploit this flaw, an<br />

attacker would need to send a rogue email to a victim on the remote host.<br />

Family Internet Services 575

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!