27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ZoneAlarm, a personal firewall for the Windows platform. The<br />

client is running a version of ZoneAlarm that is less than 6.1.737.000. This version of<br />

ZoneAlarm is reported to be vulnerable to a number of flaws that can render the firewall<br />

unuseable or, in some instances, give the users a false sense of security.<br />

Solution: Upgrade to version 6.1.737.000 or higher.<br />

CVE Not available<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-009)<br />

<strong>PVS</strong> ID: 3308 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:20249<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Apple Mac OS X, but lacks <strong>Security</strong> Update 2005-009. This security update<br />

contains fixes for the following applications :\n- Apache2\n- Apache_mod_ssl\n-<br />

CoreFoundation\n- curl\n- iodbcadmintool\n- OpenSSL\n- passwordserver\n- Safari\nsudo\n-<br />

syslog<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Opera <<br />

CVE-2005-3704<br />

<strong>PVS</strong> ID: 3309 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is using a version of Opera that is vulnerable to a number of remote Denial of<br />

Service (DoS) attacks. An attacker exploiting these flaws would need to be able to convince<br />

a user to browse to a malicious URI. Successful exploitation would result in the browser<br />

crashing.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3946<br />

SQL Injector SQL Injection Tool Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3310 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running SQL Injector. SQL Injector is a tool that automates SQL<br />

Injection queries and tests database applications. Given a form or script that is vulnerable to<br />

SQL Injection, SQL Injector will take care of all the brute-forcing necessary to exploit the<br />

remote database. The script that SQL Injector appears to be targeting is\n\n%L<br />

Family Internet Services 853

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!