27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Enable PHP's 'magic_quotes_gpc' setting and disable 'allow_url_fopen'.<br />

CVE-2005-2413<br />

Apache < 2.0.55 HTTP Smuggling Vulnerability<br />

<strong>PVS</strong> ID: 3112 FAMILY: Web Servers RISK: HIGH NESSUS ID:19296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote SSL flaw.\n\nThe remote host<br />

appears to be running a version of Apache, an open source web server. This version of<br />

Apache is vulnerable to a flaw in the way that it handles mod_ssl CRL verification<br />

callback. In order for an attacker to exploit this flaw the attacker would need to find a<br />

server that was configured to use a malicious certificate revocation list (CRL).<br />

Solution: Upgrade to version 2.0.55 or higher.<br />

CVE-2005-2088<br />

ProFTPD < 1.3.0rc2 Multiple Format Strings<br />

<strong>PVS</strong> ID: 3113 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19302<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using ProFTPD, a free FTP server for Unix and Linux. According to its banner, the<br />

version of ProFTPD installed on the remote host suffers from multiple format string<br />

vulnerabilities, one involving the 'ftpshut' utility and the other in mod_sql's 'SQLShowInfo'<br />

directive. Exploitation of either requires involvement on the part of a site administrator and<br />

can lead to information disclosure, denial of service, and even a compromise of the affected<br />

system. According to the banner, the remote version of ProFTPD is: \n %L<br />

Solution: Upgrade to version 1.3.0rc2 or higher.<br />

CVE-2006-6563<br />

Lotus Domino Server Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 3114 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19309<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of Lotus Domino Server that is prone to<br />

several information disclosure vulnerabilities. Specifically, users' password hashes and<br />

other data are included in hidden fields in the public address book 'names.nsf' that is<br />

readable by default by all users. Moreover, Domino does not use a 'salt' to compute<br />

password hashes, which makes it easier to crack passwords.<br />

Solution: Upgrade to version 6.5.5, 6.0.6 or higher.<br />

CVE-2005-2428<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 794

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!