27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

attacker can potentially read confidential data from protected areas of the server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2437<br />

Symantec Norton Antivirus Detection<br />

<strong>PVS</strong> ID: 2353 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Symantec's Norton Antivirus version %L<br />

Solution: Ensure that you are running the latest version of Symantec NAV.<br />

CVE Not available<br />

PHP < 5.0.2 Open Bracket Memory Disclosure<br />

<strong>PVS</strong> ID: 2354 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of PHP that is older than 5.0.2. This<br />

version has a bug that allows an attacker to insert an arbitrary value into an array. When the<br />

PHP parser handles the array, it may leak memory information back to the web client. A<br />

successful attacker would be able to retrieve information from the server that is potentially<br />

confidential in nature.<br />

Solution: Upgrade to PHP 5.0.2 or higher.<br />

CVE Not available<br />

DCP-Portal < 6.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2355 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is running a version of DCP-Portal that is reported prone to three distinct<br />

vulnerabilities. DCP-Portal is software that handles content management submitted by<br />

various clients or users. This version is vulnerable to Cross-Site Scripting (XSS), HTML<br />

injection, and HTML-splitting attacks. An attacker exploiting these flaws would be able to<br />

modify HTTP data and/or create malicious links or code for other visiting users to execute.<br />

Solution: Upgrade to version 6.1 or higher.<br />

CVE-2004-2511<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

WordPress BLOG < 1.2.1 wp-login.php HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2356 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 594

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!