27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nA rogue DNS server may crash the remote proxy.\n\nThe remote version of<br />

this software is vulnerable to a denial of service when processing invalid DNS responses.<br />

An attacker may exploit this flaw to disable this service remotely. To exploit this flaw, an<br />

attacker would need to be able to inject malformed DNS responses to the queries sent by<br />

the remote application.<br />

Solution: Upgrade to version 8.11.6 or higher.<br />

CVE-2006-2072<br />

ISC BIND < 9.3.3 DNS Message Malformed TSIG Remote DoS<br />

<strong>PVS</strong> ID: 3523 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote BIND DNS server is vulnerable to a flaw in the way that it handles TSIG responses.<br />

An attacker exploiting this flaw would need to have the ability to send malformed<br />

responses to the vulnerable DNS Server. Successful exploitation would lead to the BIND<br />

server crashing.<br />

Solution: Upgrade to version 9.3.3 or higher.<br />

CVE-2006-2073<br />

Oracle 10g Application Server SQL Injection<br />

<strong>PVS</strong> ID: 3524 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running a version of the Oracle 10g Application Server that is vulnerable to a remote<br />

SQL injection attack. An attacker exploiting this flaw would gain limited access to the<br />

remote database server. Successful exploitation would allow the attacker the ability to<br />

execute SQL commands on the database server.<br />

Solution: Upgrade to version 10.1.3.0.0 or higher.<br />

CVE-2007-1609<br />

ClamAV < 0.88.2 HTTP Header Remote Overflow<br />

<strong>PVS</strong> ID: 3525 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an antivirus application. The remote host is running version: \n %L<br />

\n\nThere is a remote buffer overflow within this version of ClamAV. Specifically, if an<br />

attacker were able to spoof or gain control of a ClamAV update server, the attacker could<br />

craft a malicious HTTP response that would trigger a buffer overflow. Successful<br />

exploitation would result in the execution of arbitrary code.<br />

Family Internet Services 909

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!