27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2005-2112<br />

Apache HTTP Request Parsing HTML Injection<br />

<strong>PVS</strong> ID: 3042 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw in the way that it parses HTTP<br />

requests.\n\nThe remote host appears to be running a version of Apache, an open source<br />

web server. This version of Apache is vulnerable to a flaw in the way that it handles<br />

malformed HTTP requests. An attacker exploiting this flaw would be able to possibly<br />

corrupt cache memory or inject HTML requests to a vulnerable Apache server. The<br />

vulnerability stems from a non-conformance to RFC 2616 that states that HTTP requests<br />

must not include both a 'Content-Length' and 'Transfer-Encoding' field.<br />

Solution: Upgrade to version 2.0.54, 1.3.33 or higher.<br />

CVE-2005-3705<br />

Tectia SSH Server < 4.3.2 Local Key Disclosure<br />

<strong>PVS</strong> ID: 3043 FAMILY: SSH RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the Tectia SSH Server on Microsoft<br />

Windows. This version of Tectia is vulnerable to a local attack where Tectia does not<br />

properly protect locally stored keys. A local user exploiting this flaw would be able to<br />

retrieve keys and exploit trust relationships.<br />

Solution: Upgrade to version 4.3.2 or higher.<br />

Prevx Pro 2005 <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3044 FAMILY: Web Clients RISK: HIGH NESSUS ID:18616<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Prevx Pro 2005, an intrusion protection<br />

system for Windows.\n\nThe installed version of Prevx Pro 2005 reportedly suffers from<br />

multiple vulnerabilities that allow local attackers to bypass the application's security<br />

features. For your information, the version of Prevx Pro is:\n\n%L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2144<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Golden FTP Server < 2.7.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3045 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18615<br />

Family Internet Services 777

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!