Qualitative Risk Analysis with CVSS Scores June 17, 2014 at 5:26pm EDT [codydumont] SC RESEARCH Confidential: The following report contains confidential information. Do not distribute, email, fax, or transfer via any electronic mechanism unless it has been approved by the recipient company's security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is grounds for termination. Table of Contents About this Report .................................................................................................................................................................................................. 1 Executive Summary .......................................................................................................................................................................................... 3 CVSS Patch Matrix ............................................................................................................................................................................................. 5 CVSS 4.0 to 4.9 ...................................................................................................................................................................................................... CVSS 5.0 to 5.9 ................................................................................................................................................................................................. 22 CVSS 6.0 to 6.9 ................................................................................................................................................................................................. 37 CVSS 7.0 to 7.9 .................................................................................................................................................................................................. 53 CVSS 8.0 to 8.9 ................................................................................................................................................................................................. 72 CVSS 9.0 to 9.9 ................................................................................................................................................................................................. 76 CVSS 10.0 to 10.0 ........................................................................................................................................................................................... 7 85 Table of Contents Qualitative Risk Analysis with CVSS Scores i About this Report Information Security professionals continuously perform various types of risk assessments within their environment. SecurityCenter users have a secret weapon in the battle to properly assess risk, and that weapon is SecurityCenter’s native ability to fully use the CVSS scoring system. A risk assessment requires a qualitative analysis of vulnerabilities with a network. The Forum of Incident Response and Security Teams (FIRST) created the Common Vulnerability Scoring System (CVSS) to normalize the methodology of analyzing risk. The CVSS provides the open framework for assessing the risk of discovered vulnerabilities. The CVSS methodology uses three metric groups, the Base, Temporal, and Environmental. This report uses the Base metric group to aid in the performance of qualitative risk analysis. The report will focus on the CVSS scores of 4.0 to 10.0. There are six base metrics used to qualitative assess the risk of a vulnerability. There are two sub groupings of the Base metric, the access metrics and the impact metrics. The access metric assigns a risk level based on the vector used to gain access to the target system. The access metrics include: Access Vector, which reflects the methods used to exploit a vulnerability; Access Complexity, which measures difficulty or complexity of that an attacker faces to exploit a vulnerability once access is obtained; and Authentication, which measures how many authentication repetitions are required to successfully exploit a vulnerability. The impact metrics use the CIA triad (Confidentiality, Integrity, Availability) to assign an impact score to a vulnerability. The impact metrics include: Confidentiality Impact: Measures the confidentiality after a successful exploit, meaning how well access by unauthorized users can be prevented and limiting access to information that could further aid the covert attack; Integrity Impact: Measures to what extent the information stored on the system is impacted when successfully exploited, meaning the impact to the accuracy and reliability the information stored on the victim system; Availability Impact: measures how system resources are effected by the vulnerability being exploited, some attacks can consume CPU, network, or other resources available to target system. The CVSS report shows vulnerabilities within each of the different CVSS score ranges (4.0 – 4.9, 5.0 – 5.9, 6.0 – 6.9, 7.0 – 7.9, 8.0 – 8.9, 9.0 – 9.9, and 10.0). The colors for CVSS Scores are orange for medium severity with a rating of 4.0 – 6.9, red for high severities that have a rating of 7.0 – 9.9, and purple for critical severities with a rating of 10.0. SecurityCenter can help identify vulnerabilities that must be mitigated in order to satisfy PCI DSS vulnerability scanning requirements. PCI DSS v3.0 Req. 11.2 states that internal and external network vulnerability scans must be run at least quarterly, and after any significant change in the network. PCI DSS v3.0 Req. 11.2.1 requires quarterly internal scans and rescans until all 'high risk' vulnerabilities are resolved, while PCI DSS v3.0 Req. 11.2.2 requires quarterly external scans and rescans until no vulnerabilities exist that are scored 4.0 or higher by the CVSS. In addition, PCI DSS v3.0 Req. 11.2.3 requires internal and external scanning, and rescanning, after any significant change to the network. PCI DSS v3.0 Req. 6.1 requires companies to establish a formal process for vulnerability identification and risk ranking using reputable outside sources. PCI DSS v3.0 further notes that 'Risk rankings should be based on industry best practices as well as consideration of potential impact. For example, criteria for ranking vulnerabilities may include consideration of the CVSS base score, and/or the classification by the vendor, and/or type of systems affected.' SecurityCenter can be used to collect vulnerability data, and also to track and monitor other threat considerations that can help your organization determine the appropriate risk ranking for internal scan findings. More information can be found here: https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf About this Report Qualitative Risk Analysis with CVSS Scores 1 By defining assets for internal or external IP networks or a range of hosts, the compliance manager can run this report for the internal and/or external network. Please note that the name of the report should be modified to reflect if the report is internal or external. To edit the report template, click the edit button and then change the name of the report, In this example, the report will be called "External CVSS Report." Next, click on the definition tab, and select the find/update link and click it. When windows comes up the top search option is called “Search Filters”, select the add button in the search filter area and select the first drop down box and select Assets. A new drop down list will appear and select “is not set”, followed by clicking the save button in the Search Filter area. Next under the “Update Actions” section, select the add button. Select the Asset in the first drop down box, and then select the “is set to” in the second drop down box. In the third drop down box select the external asset group and select save. The last step is to click the “Update” button in the middle of the window on the left hand side. After the button is clicked, the window at the bottom will be updated with filters that have been modified. Finally, click the close button on the bottom of the “Find/Update Filters” window and click submit at the bottom of the page. Now the report has been customized and can be launched, and only the IP addresses that are part of the “External” assets will be covered in the report. While this report can often result in a file with more than 1000 pages, this scalability of this report allows the user to select only the chapters that is needed. One approach would be to have seven separate reports, one with each CVSS level. This can be easily accomplished by only selecting the desired report when importing from the feed, or by making a local copy of the report and deleting the unused chapters. About this Report Qualitative Risk Analysis with CVSS Scores 2 Executive Summary The Vulnerability Information by CVSS Score matrix provides the cumulative number of vulnerable hosts, the number of vulnerabilities and the percentage of exploitable vulnerabilities. Each row is a different set of CVSS scores. This chart only provides information on medium to critical CVSS scores. These CVSS scores ranges are (4.0 – 4.9, 5.0 – 5.9, 6.0 – 6.9, 7.0 – 7.9, 8.0 – 8.9, 9.0 – 9.9, and 10.0) Vulnerability Information by CVSS Score Vulnerable Hosts Vulnerabilities Exploitable CVSS 4.0 - 4.9 9 111 . 5% CVSS 5.0 - 5.9 9 78 .2 % CVSS 6.0 - 6.9 9 120 .2 % CVSS 7.0 - 7.9 2 56 .2 % CVSS 8.0 - 8.9 1 9 CVSS 9.0 - 9.9 2 11 CVSS 10.0 2 29 . 8% 2 .2 % The CVSS Trending for 3 Months chart provides an overview of the different CVSS Scores over the last 3 months. Each CVSS range is defined as a different set of CVSS scores. These score ranges are 4.0 – 4.9, 5.0 – 5.9. 6.0 – 6.9, 7.0 – 7.9, 8.0 – 8.9, 9.0 – 9.9 and 10.0 within this trending chart. The trend graph calculates the data points every 24 hours to illustrate a daily trend during a three-month period. CVSS Trending for 3 Months Executive Summary Qualitative Risk Analysis with CVSS Scores 3 The Vulnerabilities by Subnet table provides a cumulative number of medium, high, and critical vulnerabilities per the top ten IP subnets. The CVSS score range is from 4.0 to 10.0. Each column provides the total number of vulnerabilities for medium (orange color), high (red color), critical (purple color) and total for each subnet. This table provides a good overview of the vulnerabilities by subnet. Vulnerabilities by Subnet IP Address Med. High Crit. Total 10.31.112.0/24 131 80 28 239 10.31.113.0/24 92 4 1 97 10.31.114.0/24 88 0 0 88 The Severities by Subnet chart provides a cumulative top ten IP subnets separated by severities of vulnerabilities within each subnet range. The filters in this chart use the Class C Summary tool, and the CVSS Score 4.0 to 10.0. Each subnet will have a bar representing the severity level, the color orange for medium severity, red for high severity, and purple for critical severity vulnerabilities. Severities by Subnet Executive Summary Qualitative Risk Analysis with CVSS Scores 4 CVSS Patch Matrix The Time to Patch Vulnerabilities table displays the CVSS Score range 4.0 - 4.9, 5.0 - 5.9, 6.0 - 6.9, 7.0 - 7.9, 8.0 - 8.9, 9.0 - 9.9, and 10. Each column show the number hosts with vulnerabilities that were patched in a day(s) ranges (0 day to 30 days), (31 days to 60 days), (61 days to 90 days) and any over 91days. The CVSS Score colors are Orange for Medium (4.0 – 6.9), Red for High (7.0 – 9.9), and Purple for Critical (10.0). Time to Patch Vulnerabilities Within 30 Days 31 - 60 Days 61 - 90 Days CVSS 4.0 - 4.9 > 90 Days 0 5 0 4 CVSS 5.0 - 5.9 0 2 0 0 CVSS 6.0 - 6.9 0 3 0 1 CVSS 7.0 - 7.9 0 2 0 1 CVSS 8.0 - 8.9 0 0 2 0 CVSS 9.0 - 9.9 0 8 2 4 CVSS 10.0 0 0 0 0 The Vulnerabilities Patched in Last X Days table displays the number of hosts with vulnerabilities that were patched in a certain amount of days. These day ranges are (0 day to 30 days), (31 days to 60 days), (61 days to 90 days) and any over 91days for each CVSS score range that was created. These CVSS Score ranges are 4.0 - 4.9, 5.0 - 5.9, 6.0 - 6.9, 7.0 - 7.9, 8.0 - 8.9, 9.0 - 9.9. The CVSS Score colors are Orange for Medium (4.0 – 6.9), Red for High (7.0 – 9.9), and Purple for Critical (10.0). Vulnerabilities Patched in Last X Days Within 30 Days 31 - 60 Days 61 - 90 Days > 90 Days CVSS 4.0 - 4.9 9 0 0 0 CVSS 5.0 - 5.9 2 0 0 0 CVSS 6.0 - 6.9 4 0 0 0 CVSS 7.0 - 7.9 2 0 1 0 CVSS 8.0 - 8.9 2 0 0 0 CVSS 9.0 - 9.9 8 3 3 0 CVSS 10.0 0 0 0 0 CVSS Patch Matrix Qualitative Risk Analysis with CVSS Scores 5 The Current Vulnerabilities Last Seen X Days Ago table displays the cumulative hosts with vulnerabilities for each CVSS Score range that was created. These CVSS Score ranges are 4.0 - 4.9, 5.0 - 5.9, 6.0 - 6.9, 7.0 7.9, 8.0 - 8.9, 9.0 - 9.9. The CVSS Score colors are Orange for Medium (4.0 – 6.9), Red for High (7.0 – 9.9), and Purple for Critical (10.0). Current Vulnerabilities Last Seen X Days Ago Within 30 Days 31 - 60 Days 61 - 90 Days > 90 Days CVSS 4.0 - 4.9 9 0 0 2 CVSS 5.0 - 5.9 9 0 0 2 CVSS 6.0 - 6.9 5 0 0 4 CVSS 7.0 - 7.9 2 0 0 0 CVSS 8.0 - 8.9 1 0 0 0 CVSS 9.0 - 9.9 2 0 0 0 CVSS 10.0 2 0 0 0 The Percent of Vulnerabilities Patched in Last X Days table tracks patched vulnerabilities and detects the time required to apply the patch. There is a separate row for CVSS. The day ranges are (0 day to 30 days), (31 days to 60 days), (61 days to 90 days) and any over 91days for each CVSS score range that was created. The CVSS Score ranges are 4.0 - 4.9, 5.0 - 5.9, 6.0 - 6.9, 7.0 - 7.9, 8.0 - 8.9, 9.0 - 9.9. The cells each contain a ratio bar showing the percentage of vulnerabilities patched. Each cell has a threshold to indicate patching progress and risk. If more than 90% of patches were applied, then the indicator will be green. When more than 75% of patches were applied the indicator is yellow. For 50% of applied patches the color is orange, followed by 25% being red, and less than 25% being purple. Green signifies a good patch management program, where yellow indicates caution. For orange and red indicators, the current patch management program is not working correctly, red being worse off than orange. For purple indicators, a serious problem is occurring and an immediate review of the patch management cycle is needed. The columns in the matrix each provide the vulnerability patch rate as compared to time taken to apply the patch. The first column displays for 30d Rate Past 30d - percent of patches that occurred within 30 days of being tracked by SecurityCenter for the past 30 calendar days. The second column displays30d Rate Past 31d - 60d - percent of patches that occurred within 30 days of being tracked by SecurityCenter between 31 and 60 calendar days ago. The third column displays 30d Rate Past 61d - 90d - percent of patches that occurred within 30 days of being tracked by SecurityCenter between 61 and 90 calendar days ago. The fourth column displays 30d Rate Past 91d - percent of patches that occurred within 30 days of being tracked by SecurityCenter over 91 calendar days ago. Percent of Vulnerabilities Patched in Last X Days CVSS Patch Matrix Qualitative Risk Analysis with CVSS Scores 6 CVSS 4.0 to 4.9 The Top 15 Host with CVSS 4.0 to 4.9 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 4.0 to 4.9. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 4.0 to 4.9 Vulnerabilities IP Address DNS Name OS CPE Total Vulns 10.31.112.10 ubuntu cpe:/o:canonical:ubuntu_ linux:11.04 10.31.113.30 turnkey-worpress.acme.lab cpe:/o:debian:debian_ linux:7.4 16 16 10.31.114.32 drupal7 cpe:/o:debian:debian_ linux:7.2 15 15 10.31.114.30 asp-net-apache cpe:/o:debian:debian_ linux:7.2 12 12 10.31.113.32 openldap cpe:/o:debian:debian_ linux:7.2 11 11 10.31.114.11 exch2.corp.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 5 5 10.31.113.11 exch1.acme.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 4 4 10.31.113.10 dc1.acme.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 2 2 10.31.114.10 dc2.corp.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 2 2 46 2 44 CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 7 The Top 10 Subnets CVSS 4.0 to 4.9 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 4.0 to 4.9 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 4.0 to 4.9; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 4.0 to 4.9 Vulnerabilities CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 8 The Top 10 Plugin Families Detecting CVSS 4.0 to 4.9 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 4.0 to 4.9 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 4.0 to 4.9 Vulnerabilities CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 9 The Details for CVSS 4.0 to 4.9 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 4.0 to 4.9 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories. Details for CVSS 4.0 to 4.9 Vulnerabilities with Affected Hosts Plugin 56306 Plugin Name Family Web Server Allows Password AutoCompletion (PCI-DSS variant) Web Servers Severity Total Medium 5 Severity Total Medium 5 Severity Total Medium 4 Description: The remote web server contains at least HTML form field containing an input of type 'password' where 'autocomplete' is not set to 'off'. While this does not represent a risk to this web server per se, it does mean that users who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or their machine is compromised at some point. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 17705 Plugin Name Family OPIE w/ OpenSSH Account Enumeration Misc. Description: When using OPIE for PAM and OpenSSH, it is possible for remote attackers to determine the existence of certain user acounts. Note that Nessus has not tried to exploit the issue, but rather only checked if OpenSSH is running on the remote host. As a result, it does not detect if the remote host actually has OPIE for PAM installed. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 62565 Plugin Name Family Transport Layer Security (TLS) Protocol CRIME Vulnerability General Description: The remote service has one of two configurations that are known to be required for the CRIME attack: CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 10 - SSL / TLS compression is enabled. - TLS advertises the SPDY protocol earlier than version 4. Note that Nessus did not attempt to launch the CRIME attack against the remote service. Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family Terminal Services Doesn't Use Network Level Authentication (NLA) 58453 Misc. Severity Total Medium 4 Severity Total Medium 4 Severity Total Medium 4 Description: The remote Terminal Services is not configured to use Network Level Authentication (NLA). NLA uses the Credential Security Support Provider (CredSSP) protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP connection is established. Hosts in Repository 'net_10_31_113': 10.31.113.10 - MAC Address: d2:c1:3e:a4:72:f2 DNS Name: dc1.acme.lab NetBIOS Name: ACME\DC1 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 Hosts in Repository 'net_10_31_114': 10.31.114.10 - MAC Address: 8e:02:85:06:ab:4d DNS Name: dc2.corp.lab NetBIOS Name: CORP\DC2 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 Plugin 57690 Plugin Name Family Terminal Services Encryption Level is Medium or Low Misc. Description: The remote Terminal Services service is not configured to use strong cryptography. Using weak cryptography with this service may allow an attacker to eavesdrop on the communications more easily and obtain screenshots and/or keystrokes. Hosts in Repository 'net_10_31_113': 10.31.113.10 - MAC Address: d2:c1:3e:a4:72:f2 DNS Name: dc1.acme.lab NetBIOS Name: ACME\DC1 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 Hosts in Repository 'net_10_31_114': 10.31.114.10 - MAC Address: 8e:02:85:06:ab:4d DNS Name: dc2.corp.lab NetBIOS Name: CORP\DC2 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 Plugin 42873 Plugin Name Family SSL Medium Strength Cipher Suites Supported General Description: The remote host supports the use of SSL ciphers that offer medium strength encryption, which we currently regard as those with key lengths at least 56 bits and less than 112 bits. CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 11 Note: This is considerably easier to exploit if the attacker is on the same physical network. Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family PHP Foreign Function Interface Arbitra ry DLL Loading safe_mode Restriction Bypass 17714 CGI abuses Severity Total Medium 4 Severity Total Medium 4 Severity Total Medium 4 Description: According to its banner, the version of PHP installed on the remote host is affected by a security bypass vulnerability. The Foreign Function Interface (ffi) extension does not follow safe_mode restrictions, which allows context-dependent attackers to execute arbitrary code by loading an arbitrary DLL and calling a function. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family Apache Mixed Platform AddType Directive Web Servers Information Disclosure 17695 Description: The remote host appears to be running Apache. When Apache runs on a Unix host with a document root on a Windows SMB share, remote, unauthenticated attackers could obtain the unprocessed contents of the directory. For example, requesting a PHP file with a trailing backslash could display the file's source instead of executing it. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 17694 Plugin Name Family Apache on Windows mod_alias URL Validation Canonicalization CGI Source Information Disclosure CGI abuses Description: The version of Apache installed on the remote Windows host can be tricked into disclosing the source of its CGI scripts because of a configuration issue. Specifically, if the CGI directory is located within the document root, then requests that alter the case of the directory name will bypass the mod_cgi cgi-script handler and be treated as requests for ordinary files. CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 12 Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family CGI Generic Cross-Site Scripting (compreh CGI abuses : XSS ensive test) 47831 Severity Total Medium 3 Severity Total Medium 2 Severity Total Medium 1 Description: The remote web server hosts CGI scripts that fail to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. These XSS are likely to be 'non-persistent' or 'reflected'. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family Microsoft ASP.NET ValidateRequest Filters Web Servers Bypass 58601 Description: According to the HTTP headers received from the remote host, the web server is configured to use the ASP.NET framework. This framework includes the ValidateRequest feature, which is used by ASP.NET web applications to filter user input in an attempt to prevent cross-site scripting attacks. However, this set of filters can be bypassed if it is the sole mechanism used for protection by a web application. Since Nessus is unable to remotely gather enough information to determine if the ValidateRequest feature is used in an unsafe manner, this plugin will report all web servers using ASP.NET when the 'Report Paranoia' configuration setting is set to 'Paranoid (more false alarms)'. Determining if an actual security risk exists requires manual verification. Hosts in Repository 'net_10_31_113': 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 Hosts in Repository 'net_10_31_114': 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 Plugin 73862 Plugin Name Family PHP 5.4.x < 5.4.28 FPM Unix Socket Insecure Permission Escalation CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.28. It is, therefore, CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 13 potentially affected by a permission escalation vulnerability. A flaw exists within the FastCGI Process Manager (FPM) when setting permissions for a Unix socket. This could allow a remote attacker to gain elevated privileges after gaining access to the socket. Note that this plugin has not attempted to exploit this issue, but instead relied only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin Plugin Name Family PHP 5.4.x < 5.4.27 awk Magic Parsing BEGIN DoS 73338 CGI abuses Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.27. It is, therefore, potentially affected by a denial of service vulnerability. A flaw exists in the awk script detector within magic/Magdir/commands where multiple wildcards with unlimited repetitions are used. This could allow a context dependent attacker to cause a denial of service with a specially crafted ASCII file. Note that this plugin has not attempted to exploit this issue, but instead relied only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 66585 Plugin Name Family PHP 5.4.x < 5.4.13 Information Disclosure CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the remote host is prior to 5.4.13. It is, therefore, potentially affected by an information disclosure vulnerability. The fix for CVE-2013-1643 was incomplete and an error still exists in the files 'ext/soap/php_xml.c' and 'ext/libxml/libxml.c' related to handling external entities. This error could cause PHP to parse remote XML documents defined by an attacker and could allow access to arbitrary files. Note that this plugin does not attempt to exploit the vulnerability, but instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 64993 Plugin Name Family PHP 5.4.x < 5.4.12 Multiple Vulnerabilities CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the remote host is prior to 5.4.12. It is, therefore, potentially affected by the following vulnerabilities : - An error exists in the file 'ext/soap/soap.c' related to the 'soap.wsdl_cache_dir' configuration directive and writing cache files that could allow remote 'wsdl' files to be written to arbitrary locations. (CVE-2013-1635) - An error exists in the file 'ext/soap/php_xml.c' related to parsing SOAP 'wsdl' files and external CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 14 entities that could cause PHP to parse remote XML documents defined by an attacker. This could allow access to arbitrary files. (CVE-2013-1643) Note that this plugin does not attempt to exploit the vulnerabilities but, instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : imagemagick vulnerability (USN1544-1) 61642 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Tom Lane discovered that ImageMagick would not always properly allocate memory. If a user or automated system using ImageMagick were tricked into opening a specially crafted PNG image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : python-crypto vulnerability (USN1484-1) 59783 Ubuntu Local Security Checks Description: It was discovered that PyCrypto produced inappropriate prime numbers when generating ElGamal keys. An attacker could use this flaw to facilitate brute-forcing of ElGamal encryption keys. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : raptor vulnerability (USN-1480-1) 59567 Ubuntu Local Security Checks Description: Timothy D. Morgan discovered that Raptor would unconditionally load XML external entities. If a user were tricked into opening a specially crafted document in an application linked against Raptor, an attacker could possibly obtain access to arbitrary files on the user's system or potentially execute arbitrary code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58578 Plugin Name Family Ubuntu 11.04 / 11.10 : aptdaemon vulnera bility (USN-1414-1) Ubuntu Local Security Checks Description: It was discovered that Aptdaemon incorrectly handled installing packages without performing a transaction simulation. An attacker could possibly use this flaw to install altered packages. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 15 Plugin 58266 Plugin Name Family Ubuntu 11.04 / 11.10 : apt vulnerability (USN-1385-1) Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Simon Ruderich discovered that APT incorrectly handled repositories that use InRelease files. The default Ubuntu repositories do not use InRelease files, so this issue only affected third-party repositories. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : apache2 vulnerabilities (USN1368-1) 57999 Ubuntu Local Security Checks Description: It was discovered that the Apache HTTP Server incorrectly handled the SetEnvIf .htaccess file directive. An attacker having write access to a .htaccess file may exploit this to possibly execute arbitrary code. (CVE-2011-3607) Prutha Parikh discovered that the mod_proxy module did not properly interact with the RewriteRule and ProxyPassMatch pattern matches in the configuration of a reverse proxy. This could allow remote attackers to contact internal webservers behind the proxy that were not intended for external exposure. (CVE-2011-4317) Rainer Canavan discovered that the mod_log_config module incorrectly handled a certain format string when used with a threaded MPM. A remote attacker could exploit this to cause a denial of service via a specially- crafted cookie. This issue only affected Ubuntu 11.04 and 11.10. (CVE-2012-0021) It was discovered that the Apache HTTP Server incorrectly handled certain type fields within a scoreboard shared memory segment. A local attacker could exploit this to to cause a denial of service. (CVE-2012-0031) Norman Hippert discovered that the Apache HTTP Server incorrecly handled header information when returning a Bad Request (400) error page. A remote attacker could exploit this to obtain the values of certain HTTPOnly cookies. (CVE-2012-0053). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57792 Plugin Name Family Apache HTTP Server httpOnly Cookie Information Disclosure Web Servers Description: The version of Apache HTTP Server running on the remote host has an information disclosure vulnerability. Sending a request with HTTP headers long enough to exceed the server limit causes the web server to respond with an HTTP 400. By default, the offending HTTP header and value are displayed on the 400 error page. When used in conjunction with other attacks (e.g., cross-site scripting), this could result in the compromise of httpOnly cookies. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 16 Plugin Plugin Name Family Ubuntu 11.04 / 11.10 : usbmuxd vulnerability Ubuntu Local Security Checks (USN-1354-1) 57790 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: It was discovered that usbmuxd did not correctly perform bounds checking when processing the SerialNumber field of USB devices. An attacker with physical access could use this to crash usbmuxd or potentially execute arbitrary code as the 'usbmux' user. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : software-properties vulnerability (USN1352-1) 57763 Ubuntu Local Security Checks Description: David Black discovered that Software Properties incorrectly validated server certificates when performing secure connections to download PPA GPG key fingerprints. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to install altered package repository GPG keys. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : xorg vulnerability (USN-1349-1) 57707 Ubuntu Local Security Checks Description: It was discovered that the X wrapper incorrectly checked certain console permissions when launched by unprivileged users. An attacker connected remotely could use this flaw to start X, bypassing the console permissions check. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. Ubuntu Local Security Checks 04 / 11.10 : bzip2 vulnerability (USN-1308-1) 57315 Description: vladz discovered that executables compressed by bzexe insecurely create temporary files when they are ran. A local attacker could exploit this issue to execute arbitrary code as the user running a compressed executable. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57060 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : acpid vulnerabilities (USN-1296-1) Ubuntu Local Security Checks Description: Oliver-Tobias Ripka discovered that an ACPI script incorrectly handled power button events. A local attacker could use this to execute arbitrary code, and possibly escalate privileges. (CVE-2011-2777) Helmut Grohne and Michael Biebl discovered that ACPI scripts were executed with a permissive file mode creation mask (umask). A local attacker could read files and modify directories created by ACPI scripts that did not set a strict umask. (CVE-2011-4578). Hosts in Repository 'net_10_31_112': CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 17 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56680 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : empathy vulnerabilities (USN-1250-1) Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: It was discovered that a cross-site scripting (XSS) vulnerability in the Adium theme allows remote attackers to inject arbitrary JavaScript or HTML via a crafted nickname in XMPP group conversations. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 55903 Plugin Name Family CGI Generic Cross-Site Scripting (extende d patterns) CGI abuses : XSS Description: The remote web server hosts one or more CGI scripts that fail to adequately sanitize request strings with malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. These XSS vulnerabilities are likely to be 'non-persistent' or 'reflected'. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 49067 Plugin Name Family CGI Generic HTML Injections (quick test) CGI abuses : XSS Description: The remote web server hosts CGI scripts that fail to adequately sanitize request strings with malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML to be executed in a user's browser within the security context of the affected site. The remote web server may be vulnerable to IFRAME injections or cross-site scripting attacks : - IFRAME injections allow 'virtual defacement' that might scare or anger gullible users. Such injections are sometimes implemented for 'phishing' attacks. - XSS are extensively tested by four other scripts. - Some applications (e.g. web forums) authorize a subset of HTML without any ill effect. In this case, ignore this warning. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 44135 Plugin Name Family Web Server Generic Cookie Injection CGI abuses Description: The remote host is running a web server that fails to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to inject arbitrary cookies. Depending on the structure of the web application, it may be possible to launch a 'session fixation' attack using this mechanism. Please note that : - Nessus did not check if the session fixation attack is feasible. CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 18 - This is not the only vector of session fixation. Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache Plugin 39466 Plugin Name Family CGI Generic Cross-Site Scripting (quick test) CGI abuses : XSS Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: The remote web server hosts CGI scripts that fail to adequately sanitize request strings with malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. These XSS are likely to be 'non persistent' or 'reflected'. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 18124 Plugin Name Family phpBB <= 2.0.14 Multiple Vulnerabilities CGI abuses Description: According to its banner, the remote host is running a version of phpBB that suffers from multiple flaws: - A BBCode Input Validation Vulnerability The application fails to properly filter for the BBCode URL in the 'includes/bbcode.php' script. With a specially crafted URL, an attacker could cause arbitrary script code to be executed in a user's browser, possibly even to modify registry entries without the user's knowledge. - Cross-Site Scripting Vulnerabilities The application does not properly sanitize user-supplied input to the 'forumname' and 'forumdesc' parameters of the 'admin/admin_forums.php' script. By enticing a phpBB administrator to visit a specially crafted link, an attacker can potentially steal the admin's session cookie or perform other attacks. - Improper Filtering of HTML Code The application does not completely filter user-supplied input to the 'u' parameter of the 'profile.php' script or the 'highlight' parameter of the 'viewtopic.php' script. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 13840 Plugin Name Family phpBB < 2.0.10 Multiple XSS CGI abuses : XSS Description: The remote host is running a version of phpBB older than 2.0.10. phpBB contains a flaw that allows a remote cross-site scripting attack. This flaw exists because the application does not validate user-supplied input in the 'search_author' parameter. This version is also vulnerable to an HTTP response splitting attack that permits the injection of CRLF characters in the HTTP headers. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 19 Plugin 10815 Plugin Name Family Web Server Generic XSS CGI abuses : XSS Severity Total Medium 1 Severity Total Medium 1 Description: The remote host is running a web server that fails to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache Plugin Plugin Name Family Apache Tomcat 6.0.x < 6.0.39 Multiple Vulnerabilities 8141 Web Servers Description: Versions of Tomcat 6.0.x earlier than 6.0.39 are potentially affected by the following vulnerabilities: - The version of Java used to build the application could generate Javadoc containing a frame injection error. (CVE-2013-1571) - The fix for CVE-2005-2090 was not complete and the application does not reject requests with multiple Content-Length HTTP headers or with ContentLength HTTP headers when using chunked encoding. (CVE-2013-4286) - The fix for CVE-2012-3544 was not complete and limits are not properly applied to chunk extensions and whitespaces in certain trailing headers. This error could allow denial of service attacks. (CVE-2013-4322) - The application allows XML External Entity (XXE) processing that could disclose sensitive information. (CVE-2013-4590) - An error exists related to the 'disableURLRewriting' configuration option and session IDs. (CVE-2014-0033) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6928 Plugin Name Family PHP 5.3.x < 5.3.27 Information Disclosure Web Servers Severity Total Medium 1 Description: PHP versions 5.3.x earlier than 5.3.23 are affected by an information disclosure vulnerability. The fix for CVE-2013-1643 was incomplete and an error still exists in the files 'ext/soap/php_xml.c' and 'ext/libxml/libxml.c' related to handling external entities. This error could cause PHP to parse remote XML documents defined by an attacker and could allow access to arbitrary filesthe buffer overflow error that exists in the function '_pdo_pgsql_error' in the file 'ext/pdo_pgsql/pgsql_driver.c' Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache 2.2.x < 2.2.25 Remote Denial of Service Vulnerability 6927 Web Servers Severity Total Medium 1 Description: Apache versions earlier than 2.2.25 are affected by a remote denial-of-service vulnerability because the 'mod_dav.c' source file fails to properly determine whether DAV is enabled for a URI. Specifically, this issue occurs when sending a URI MERGE request handled by the 'mod_dav_svn' module with the source href pointing to a URI not configured for DAV. An attacker can exploit this issue to cause a segmentation fault. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6868 Plugin Name Family OpenSSL < 0.9.8y / 1.0.1d / 1.0.0k Multiple Vulnerabilities Web Servers Severity Total Medium 1 Description: Versions of OpenSSL prior to 0.9.8y are reportedly affected by the following vulnerabilities : - An error exists related to the handling of OCSP response verification that could allow denial of service attacks. (CVE-2013-0166) CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 20 - An error exists related to the SSL/TLS/DTLS protocols, CBC mode encryption and response time. An attacker could obtain plaintext contents of encrypted traffic via timing attacks. (CVE-2013-0169) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6707 Plugin Name Family PHP 5.3.x < 5.3.22 Multiple Vulnerabilities Web Servers Severity Total Medium 1 Description: PHP versions 5.3.x earlier than 5.3.22 are affected by the following vulnerabilities : - An error exists in the file 'ext/soap/soap.c' related to the 'soap.wsdl_cache_dir' configuration directive and writing cache files that could allow remote 'wsdl' files to be written to arbitrary locations. (CVE-2013-1635) - An error exists in the file 'ext/soap/php_xml.c' related to parsing SOAP 'wsdl' files and external entities that could cause PHP to parse remote XML documents defined by an attacker. This could allow access to arbitrary files. (CVE-2013-1643) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache 2.2 < 2.2.24 Multiple Cross-Site Scripting Vulnerabilites 6701 Web Servers Severity Total Medium 1 Description: The remote host is running a Apache HTTP server. Versions earlier than 2.4.4 are vulnerable to the following vulnerabilities : - Errors exist related to the modules mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp and unescaped hostnames and URIs that could allow cross-site scripting attacks. (CVE-2012-3499) - An error exists related to the mod_proxy_balancer module's manager interface that could allow cross-site scripting attacks. (CVE-2012-4558) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family PHP 5.3.x < 5.3.21 cURL X.509 Certificate Domain Name Matching MiTM Weakness 6671 Web Servers Severity Total Medium 1 Description: PHP versions 5.3.x earlier than 5.3.21 are affected by a weakness in the cURL extension that call allow SSL spoofing and man-in-the-middle attacks. When attempting to validate a certificate, the cURL library (libcurl) fails to verify that a server hostname matches a domain name in an X.509 certificate's 'Subject Common Name' (CN) or 'SubjectAltName'. Note that this plugin does not attempt to verify whether the PHP install has been built with the cURL extention but instead relies only on PHP's selfreported version number. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6062 Plugin Name Family Apache 2.2 < 2.2.21 mod_proxy_ajp DoS Web Servers Severity Total High 1 Description: Versions of Apache 2.2 earlier than 2.2.21 are potentially affected by a denial of service vulnerability. An error exists in the mod_proxy_ajp module that can allow specially crafted HTTP requests to cause a backend server to temporarily enter an error state. This vulnerability only occurs when mod_proxy_ajp is used along with mod_proxy_balancer. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 4.0 to 4.9 Qualitative Risk Analysis with CVSS Scores 21 CVSS 5.0 to 5.9 The Top 15 Host with CVSS 5.0 to 5.9 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 5.0 to 5.9. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 5.0 to 5.9 Vulnerabilities IP Address DNS Name OS CPE Vulns 10.31.112.10 ubuntu cpe:/o:canonical:ubuntu_ linux:11.04 10.31.113.30 turnkey-worpress.acme.lab cpe:/o:debian:debian_linux:7.4 7 10.31.113.32 openldap cpe:/o:debian:debian_linux:7.2 7 10.31.114.32 drupal7 cpe:/o:debian:debian_linux:7.2 7 10.31.114.11 exch2.corp.lab cpe:/o:microsoft:windows_server _2008:r2:sp1:enterprise 5 10.31.113.11 exch1.acme.lab cpe:/o:microsoft:windows_server _2008:r2:sp1:enterprise 4 10.31.113.10 dc1.acme.lab cpe:/o:microsoft:windows_server _2008:r2:sp1:enterprise 2 10.31.114.10 dc2.corp.lab cpe:/o:microsoft:windows_server _2008:r2:sp1:enterprise 2 10.31.114.30 asp-net-apache cpe:/o:debian:debian_linux:7.2 1 43 CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 22 The Top 10 Subnets CVSS 5.0 to 5.9 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 5.0 to 5.9 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 5.0 to 5.9; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 5.0 to 5.9 Vulnerabilities CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 23 The Top 10 Plugin Families Detecting CVSS 5.0 to 5.9 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 5.0 to 5.9 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 5.0 to 5.9 Vulnerabilities CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 24 The Details for CVSS 5.0 to 5.9 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 5.0 to 5.9 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories.5.4.1 – [PARA4] - 5.0 – 5.9 Details for CVSS 5.0 to 5.9 Vulnerabilities with Affected Hosts Plugin Plugin Name Family OpenSSH S/KEY Authentication Account Enumeration 17704 Misc. Severity Total Medium 5 Severity Total Medium 4 Severity Total Medium 4 Description: When OpenSSH has S/KEY authentication enabled, it is possible to determine remotely if an account configured for S/KEY authentication exists. Note that Nessus has not tried to exploit the issue, but rather only checked if OpenSSH is running on the remote host. As a result, it will not detect if the remote host has implemented a workaround. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 46803 Plugin Name Family PHP expose_php Information Disclosure Web Servers Description: The PHP install on the remote server is configured in a way that allows disclosure of potentially sensitive information to an attacker through a special URL. Such a URL triggers an Easter egg built into PHP itself. Other such Easter eggs likely exist, but Nessus has not checked for them. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 18405 Plugin Name Family Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness Windows Description: The remote version of the Remote Desktop Protocol Server (Terminal Service) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP client makes no effort to validate the identity of the server when CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 25 setting up encryption. An attacker with the ability to intercept traffic from the RDP server can establish encryption with the client and server without being detected. A MiTM attack of this nature would allow the attacker to obtain any sensitive information transmitted, including authentication credentials. This flaw exists because the RDP server stores a hard-coded RSA private key in the mstlsapi.dll library. Any local user with access to this file (on any Windows system) can retrieve the key and use it for this attack. Hosts in Repository 'net_10_31_113': 10.31.113.10 - MAC Address: d2:c1:3e:a4:72:f2 DNS Name: dc1.acme.lab NetBIOS Name: ACME\DC1 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 Hosts in Repository 'net_10_31_114': 10.31.114.10 - MAC Address: 8e:02:85:06:ab:4d DNS Name: dc2.corp.lab NetBIOS Name: CORP\DC2 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 Plugin Plugin Name Family PHP ip2long Function String Validation Weakness 17715 CGI abuses Severity Total Medium 4 Severity Total Medium 2 Description: According to its banner, the 'ip2long()' function in the version of PHP installed on the remote host may incorrectly validate an arbitrary string and return a valid network IP address. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 64589 Plugin Name Family Microsoft ASP.NET MS-DOS Device Name Web Servers DoS (PCI-DSS check) Description: The web server running on the remote host appears to be using Microsoft ASP.NET, and may be affected by a denial of service vulnerability. Requesting a URL containing an MS-DOS device name can cause the web server to become temporarily unresponsive. An attacker could repeatedly request these URLs, resulting in a denial of service. Additionally, there is speculation that this vulnerability could result in code execution if an attacker with physical access to the machine connects to a serial port. This plugin does not attempt to exploit the vulnerability and only runs when 'Check for PCI-DSS compliance' is enabled in the scan policy. This plugin reports all web servers using ASP.NET 1.1. If it cannot determine the version, it will report all web servers using ASP.NET. Manual verification is required to determine if a vulnerability is present. Hosts in Repository 'net_10_31_113': 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 Hosts in Repository 'net_10_31_114': 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 26 Plugin 57640 Plugin Name Family Web Application Information Disclosure CGI abuses Severity Total Medium 2 Severity Total Medium 2 Severity Total Medium 2 Severity Total Medium 1 Description: At least one web application hosted on the remote web server discloses the physical path to its directories when a malformed request is sent to it. Leaking this kind of information may help an attacker fine-tune attacks against the application and its backend. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 20007 Plugin Name Family SSL Version 2 (v2) Protocol Detection Service detection Description: The remote service accepts connections encrypted using SSL 2.0, which reportedly suffers from several cryptographic flaws and has been deprecated for several years. An attacker may be able to exploit these issues to conduct man-in-the-middle attacks or decrypt communications between the affected service and clients. Hosts in Repository 'net_10_31_113': 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 Hosts in Repository 'net_10_31_114': 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 Plugin Plugin Name Family DNS Server Cache Snooping Remote Information Disclosure 12217 DNS Description: The remote DNS server responds to queries for third-party domains that do not have the recursion bit set. This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited. For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution, they would be able to use this attack to build a statistical model regarding company usage of that financial institution. Of course, the attack can also be used to find B2B partners, web-surfing patterns, external mail servers, and more. Note: If this is an internal DNS server not accessable to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported. Hosts in Repository 'net_10_31_113': 10.31.113.10 - MAC Address: d2:c1:3e:a4:72:f2 DNS Name: dc1.acme.lab NetBIOS Name: ACME\DC1 Hosts in Repository 'net_10_31_114': 10.31.114.10 - MAC Address: 8e:02:85:06:ab:4d DNS Name: dc2.corp.lab NetBIOS Name: CORP\DC2 Plugin 71927 Plugin Name Family PHP 5.4.x < 5.4.24 Multiple Vulnerabilities CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 27 remote host is a version prior to 5.4.24. It is, therefore, potentially affected by the following vulnerabilities : - A heap-based buffer overflow error exists in the file 'ext/date/lib/parse_iso_intervals.c' related to handling DateInterval objects that could allow denial of service attacks. (CVE-2013-6712) - An integer overflow error exists in the function 'exif_process_IFD_TAG' in the file 'ext/exif/exif.c' that could allow denial of service attacks or arbitrary memory reads. (Bug #65873) Note that this plugin does not attempt to exploit the vulnerabilities, but instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS / 12.10 : firefox vulnerabilities (USN1620-1) 62733 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Mariusz Mlynski and others discovered several flaws in Firefox that allowed a remote attacker to conduct cross-site scripting (XSS) attacks. (CVE-2012-4194, CVE-2012-4195) Antoine Delignat-Lavaud discovered a flaw in the way Firefox handled the Location object. If a user were tricked into opening a specially crafted page, a remote attacker could exploit this to bypass security protections and perform cross-origin reading of the Location object. (CVE-2012-4196). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 : libgdata, evolution-data-server vulnerability (USN1547-1) 61707 Ubuntu Local Security Checks Description: Vreixo Formoso discovered that the libGData library, as used by Evolution and other applications, did not properly verify SSL certificates. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter data transmitted via the GData protocol. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 61569 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 : nss vulnerability (USN-1540-1) Ubuntu Local Security Checks Description: Kaspar Brand discovered a vulnerability in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. If the user were tricked into opening a specially crafted certificate, an attacker could possibly exploit this to cause a denial of service via application crash. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 28 Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : expat vulnerabilities (USN- Ubuntu Local Security Checks 1527-1) 61485 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: It was discovered that Expat computed hash values without restricting the ability to trigger hash collisions predictably. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive CPU resources. (CVE-2012-0876) Tim Boddy discovered that Expat did not properly handle memory reallocation when processing XML files. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive memory resources. This issue only affected Ubuntu 8.04 LTS, 10.04 LTS, 11.04 and 11.10. (CVE-2012-1148). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59452 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : mysql-5.1, mysql-5.5, mysqlUbuntu Local Security Checks dfsg-5.0, mysql-dfsg-5.1 vulnerabilities (USN-1467-1) Description: It was discovered that certain builds of MySQL incorrectly handled password authentication on certain platforms. A remote attacker could use this issue to authenticate with an arbitrary password and establish a connection. (CVE-2012-2122) MySQL has been updated to 5.5.24 in Ubuntu 12.04 LTS. Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10 have been updated to MySQL 5.1.63. A patch to fix the issue was backported to the version of MySQL in Ubuntu 8.04 LTS. In addition to additional security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information : http://dev.mysql.com/doc/refman/5.5/en/news-5-5-24.html http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59364 Plugin Name Family Ubuntu 11.04 / 11.10 / 12.04 LTS : updatemanager vulnerability (USN-1443-2) Ubuntu Local Security Checks Description: USN-1443-1 fixed vulnerabilities in Update Manager. The fix for CVE-2012-0949 was discovered to be incomplete. This update fixes the problem. Felix Geyer discovered that the Update Manager Apport hook incorrectly uploaded certain system state archive files to Launchpad when reporting bugs. This could possibly result in repository credentials being included in public bug reports. (CVE-2012-0949). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 29 Plugin Plugin Name Family Ubuntu 11.04 / 11.10 / 12.04 LTS : updatemanager vulnerabilities (USN-1443-1) 59186 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: It was discovered that Update Manager created system state archive files with incorrect permissions when upgrading releases. A local user could possibly use this to read repository credentials. (CVE-2012-0948) Felix Geyer discovered that the Update Manager Apport hook incorrectly uploaded certain system state archive files to Launchpad when reporting bugs. This could possibly result in repository credentials being included in public bug reports. (CVE-2012-0949). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : libtasn1-3 vulnerability (USNUbuntu Local Security Checks 1436-1) 58974 Description: Matthew Hall discovered that Libtasn incorrectly handled certain large values. An attacker could exploit this with a specially crafted ASN.1 structure and cause a denial of service, or possibly execute arbitrary code. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : gnutls13, gnutls26 vulnerabilitie Ubuntu Local Security Checks s (USN-1418-1) 58618 Description: Alban Crequy discovered that the GnuTLS library incorrectly checked array bounds when copying TLS session data. A remote attacker could crash a client application, leading to a denial of service, as the client application prepared for TLS session resumption. (CVE-2011-4128) Matthew Hall discovered that the GnuTLS library incorrectly handled TLS records. A remote attacker could crash client and server applications, leading to a denial of service, by sending a crafted TLS record. (CVE-2012-1573). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58145 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : libxml2 vulnerability (USN-1376- Ubuntu Local Security Checks 1) Description: Juraj Somorovsky discovered that libxml2 was vulnerable to hash table collisions. If a user or application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause a denial of service. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 30 Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : python-httplib2 vulnerability (USN-1375-1) 58144 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: The httplib2 Python library earlier than version 0.7.0 did not perform any server certificate validation when using HTTPS connections. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to alter or compromise confidential information in applications that used the httplib2 library. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : tomcat6 vulnerabilities (USN-1359-1) 57933 Ubuntu Local Security Checks Description: It was discovered that Tomcat incorrectly performed certain caching and recycling operations. A remote attacker could use this flaw to obtain read access to IP address and HTTP header information in certain cases. This issue only applied to Ubuntu 11.10. (CVE-2011-3375) It was discovered that Tomcat computed hash values for form parameters without restricting the ability to trigger hash collisions predictably. A remote attacker could cause a denial of service by sending many crafted parameters. (CVE-2011-4858) It was discovered that Tomcat incorrectly handled parameters. A remote attacker could cause a denial of service by sending requests with a large number of parameters and values. (CVE-2012-0022). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. Ubuntu Local Security Checks 04 / 11.10 : bind9 vulnerability (USN-1264-1) 56861 Description: It was discovered that Bind incorrectly handled certain specially crafted packets. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56778 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : apache2, apache2-mpm-itk vulnerabilities (USN-1259-1) Ubuntu Local Security Checks Description: It was discovered that the mod_proxy module in Apache did not properly interact with the RewriteRule and ProxyPassMatch pattern matches in the configuration of a reverse proxy. This could allow remote attackers to contact internal webservers behind the proxy that were not intended for external exposure. (CVE-2011-3368) Stefano Nichele discovered that the mod_proxy_ajp module in Apache when used with mod_proxy_balancer in certain configurations could allow remote attackers to cause a denial of service via a malformed HTTP request. (CVE-2011-3348) Samuel Montosa discovered that the ITK Multi-Processing Module for Apache did not properly handle certain configuration sections that specify NiceValue but not AssignUserID, preventing Apache from CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 31 dropping privileges correctly. This issue only affected Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1176) USN 1199-1 fixed a vulnerability in the byterange filter of Apache. The upstream patch introduced a regression in Apache when handling specific byte range requests. This update fixes the issue. A flaw was discovered in the byterange filter in Apache. A remote attacker could exploit this to cause a denial of service via resource exhaustion. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 11.04 : rsyslog vulnerability (USN1224-1) 56384 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: It was discovered that rsyslog had an off-by-two error when parsing legacy syslog messages. An attacker could potentially exploit this to cause a denial of service via application crash. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56206 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 : cups, cupsys vulnerabilities (USN1207-1) Ubuntu Local Security Checks Description: Tomas Hoger discovered that the CUPS image library incorrectly handled LZW streams. A remote attacker could use this flaw to cause a denial of service or possibly execute arbitrary code. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 55640 Plugin Name Family SQL Dump Files Disclosed via Web Server CGI abuses Description: The remote web server hosts publicly available files that contain SQL instructions. These files are most likely database dumps and may contain sensitive information. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 45411 Plugin Name Family SSL Certificate with Wrong Hostname General Description: The commonName (CN) of the SSL certificate presented on this service is for a different machine. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 44670 Plugin Name Family Web Application SQL Backend Identif ication CGI abuses Description: At least one web application hosted on the remote web server is built on a SQL backend that Nessus was able to identify by looking at error messages. CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 32 Leaking this kind of information may help an attacker fine-tune attacks against the application and its backend. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 42056 Plugin Name Family CGI Generic Local File Inclusion CGI abuses Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: The remote web server hosts CGI scripts that fail to adequately sanitize request strings. By leveraging this issue, an attacker may be able to include a local file and disclose its content. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 17205 Plugin Name Family phpBB <= 2.0.11 Multiple Vulnerabilities CGI abuses Description: The remote host is running phpBB version 2.0.11 or older. Such versions suffer from multiple vulnerabilities: - full path display on critical messages. - full path disclosure in username handling caused by a PHP 4.3.10 bug. - arbitrary file disclosure vulnerability in avatar handling functions. - arbitrary file unlink vulnerability in avatar handling functions. - path disclosure bug in search.php caused by a PHP 4.3.10 bug. - path disclosure bug in viewtopic.php caused by a PHP 4.3.10 bug. The path disclosure vulnerabilities can be exploited by remote attackers to reveal sensitive information about the installation that can be used in further attacks against the target. To exploit the avatar handling vulnerabilities, 'Enable gallery avatars' must be enabled on the target (by default, it is disabled) and an attacker have a phpBB account on the target. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 12218 Plugin Name Family mDNS Detection (Remote Network) Service detection Description: The remote service understands the Bonjour (also known as ZeroConf or mDNS) protocol, which allows anyone to uncover information from the remote host such as its operating system type and exact version, its hostname, and the list of services it is running. This plugin attempts to discover mDNS used by hosts that are not on the network segment on which Nessus resides. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 11411 Plugin Name Family Backup Files Disclosure CGI abuses Description: By appending various suffixes (ie: .old, .bak, ~, etc...) to the names of various files on the remote host, it seems possible to retrieve their contents, which may result in disclosure of sensitive information. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 33 Plugin Plugin Name Family Web Server info.php / phpinfo.php Detecti CGI abuses on 11229 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Many PHP installation tutorials instruct the user to create a PHP file that calls the PHP function 'phpinfo()' for debugging purposes. Various PHP applications may also include such a file. By accessing such a file, a remote attacker can discover a large amount of information about the remote web server, including : - The username of the user who installed PHP and if they are a SUDO user. - The IP address of the host. - The version of the operating system. - The web server version. - The root directory of the web server. - Configuration information about the remote PHP installation. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache mod_info /server-info Information Disclosure 10678 Web Servers Description: It is possible to obtain an overview of the remote Apache web server's configuration by requesting the URL '/server-info'. This overview includes information such as installed modules, their configuration, and assorted run-time settings. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 10079 Plugin Name Family Anonymous FTP Enabled FTP Description: This FTP service allows anonymous logins. Any remote user may connect and authenticate without providing a password or unique credentials. This allows a user to access any files made available on the FTP server. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 8253 Plugin Name Family OpenSSL < 0.9.8za / < 1.0.0m / < 1.0.1h Multiple Vulnerabilities Web Servers Description: OpenSSL before 0.9.8za, 1.0.0m, or 1.0.1h are unpatched for the following vulnerabilities: - Potential arbitrary code execution due to a buffer overflow vulnerability when processing invalid DTLS fragments (CVE-2014-0195) - Denial of service via a NULL pointer dereference error in 'so_ssl3_write()' function of 's3_pkt.c' source file (CVE-2014-0198) - Denial of service against an OpenSSL client due to a recursion flaw in the DTLS hadnshake. (CVE-2014-0221) - A man-in-the-middle security bypass due to weak keying material in OpenSSL SSL/TLS clients and servers, which can be exploited via a specially crafted handshake (CVE-2014-0224) CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 34 - Denial of service that can be triggered in the case where anonymous ECDH ciphersuites are enabled in TLS clients (CVE-2014-3470) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family OpenSSL 0.9.8 < 0.9.8u / 1.0.0 < 1.0.0h Multiple Vulnerabilities 6400 Web Servers Severity Total Medium 1 Description: OpenSSL versions earlier than 0.9.8u and 1.0.0h are potentially affected by multiple vulnerabilities : - A NULL pointer dereference flaw exists in mime_param_cmp. A specially crafted S/MIME input header could cause an application to crash during S/ MIME message verification or decryption. (CVE-2012-1165) - A weakness in the OpenSSL CMS and PKCS 7 code can be exploited using Bleichenbacher's attack on PKCS 1 v1.5 RSA padding. Note that only users of CMS, PKCS 7, or S/MIME decryption operations are affected. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache Tomcat 6.0.x < 6.0.33 Multiple Vulnerabilities 6018 Web Servers Severity Total Medium 1 Description: Versions of Tomcat 6.x earlier than 6.0.33 are potentially affected by multiple vulnerabilities : - An error handling issue exists related to the MemoryUserDatabase that allows user passwords to be disclosed through log files. (CVE-2011-2204) - An input validation error exists that allows a local attacker to either bypass security or carry out denial of service attacks when the APR or NIO connectors are enabled. (CVE-2011-2526) - A component that Apache Tomcat relies on called 'jsvc' contains an error in that it does not drop capabilities after starting and can allow access to sensitive files owned by the super user. Note this vulnerability only affects Linux operating systems and only when the following are true: jsvc is compiled with libpcap and the '-user' parameter is used. (CVE-2011-2729) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache Tomcat 6.0.x < 6.0.32 Denial of Service Vulnerability 5790 Web Servers Severity Total Medium 1 Description: Versions of Tomcat 6.x earlier than 6.0.32 are potentially affected by a denial of service vulnerability because the NIO connector expands its buffer endlessly during request line processing. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 5789 Plugin Name Family Apache Tomcat 6.0.x < 6.0.30 Multiple Vulnerabilities Web Servers Severity Total Medium 1 Description: Versions of Tomcat 6.x earlier than 6.0.30 are potentially affected by multiple vulnerabilities : - When running under a SecurityManager it is possible for a web application to gain read/write permissions to any area on the file system. (CVE-2010-3718) - It is possible to conduct cross-site scripting attacks via the 'sort' and 'orderBy' parameers of the Manager application. (CVE-2010-4172) - The HTML Manager interface displays web application provided data, such as display names, without filtering. (CVE-2011-0013) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 35 Plugin 5720 Plugin Name Family OpenSSL < 0.9.8q / 1.0.0c Multiple Vulnera Web Servers bilities Severity Total Medium 1 Description: Versions of OpenSSL earlier than 0.9.8q and 1.0.0c are potentially affected by multiple vulnerabilities : - It may be possible to downgrade the ciphersuite to a weaker version by modifying the stored session cache cipher suite. - An error exists in the J-PAKE implementation which could lead to successful validation by someone with no knowledge of the shared secret. IAVA Reference : 2011-A-0160 IAVB Reference : 2012-B-0038 STIG Finding Severity : Category I Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 5.0 to 5.9 Qualitative Risk Analysis with CVSS Scores 36 CVSS 6.0 to 6.9 The Top 15 Host with CVSS 6.0 to 6.9 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 6.0 to 6.9. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 6.0 to 6.9 Vulnerabilities IP Address DNS Name OS CPE Score Vulns 10.31.112.10 ubuntu cpe:/o:canonical:ubuntu_ linux:11.04 10.31.113.30 turnkey-worpress.acme.lab cpe:/o:debian:debian_ linux:7.4 48 16 10.31.114.11 exch2.corp.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 42 14 10.31.114.32 drupal7 cpe:/o:debian:debian_ linux:7.2 42 14 10.31.113.32 openldap cpe:/o:debian:debian_ linux:7.2 39 13 10.31.114.30 asp-net-apache cpe:/o:debian:debian_ linux:7.2 27 9 10.31.113.11 exch1.acme.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 24 8 10.31.113.10 dc1.acme.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 6 2 10.31.114.10 dc2.corp.lab cpe:/o:microsoft:windows _server_2008:r2:sp1:enterpr ise 6 2 126 42 CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 37 The Top 10 Subnets CVSS 6.0 to 6.9 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 6.0 to 6.9 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 6.0 to 6.9; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 6.0 to 6.9 Vulnerabilities CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 38 The Top 10 Plugin Families Detecting CVSS 6.0 to 6.9 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 6.0 to 6.9 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 6.0 to 6.9 Vulnerabilities CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 39 The Details for CVSS 6.0 to 6.9 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 6.0 to 6.9 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories. Details for CVSS 6.0 to 6.9 Vulnerabilities with Affected Hosts Plugin 57582 Plugin Name Family SSL Self-Signed Certificate General Severity Total Medium 8 Severity Total Medium 8 Description: The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority. Hosts in Repository 'net_10_31_113': 10.31.113.10 - MAC Address: d2:c1:3e:a4:72:f2 DNS Name: dc1.acme.lab NetBIOS Name: ACME\DC1 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.10 - MAC Address: 8e:02:85:06:ab:4d DNS Name: dc2.corp.lab NetBIOS Name: CORP\DC2 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 51192 Plugin Name Family SSL Certificate Cannot Be Trusted General Description: The server's X.509 certificate does not have a signature from a known public certificate authority. This situation can occur in three different ways, each of which results in a break in the chain below which certificates cannot be trusted. First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. Third, the certificate chain may contain a signature that either didn't match the certificate's information, or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 40 identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host. Hosts in Repository 'net_10_31_113': 10.31.113.10 - MAC Address: d2:c1:3e:a4:72:f2 DNS Name: dc1.acme.lab NetBIOS Name: ACME\DC1 10.31.113.11 - MAC Address: 82:97:5f:32:26:04 DNS Name: exch1.acme.lab NetBIOS Name: ACME\EXCH1 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.10 - MAC Address: 8e:02:85:06:ab:4d DNS Name: dc2.corp.lab NetBIOS Name: CORP\DC2 10.31.114.11 - MAC Address: 0a:d9:af:9b:69:c2 DNS Name: exch2.corp.lab NetBIOS Name: CORP\EXCH2 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family CGI Generic Cross-Site Request Forgery Detection (potential) 56818 CGI abuses Severity Total Medium 5 Severity Total Medium 5 Description: The spider found HTML forms on the remote web server. Some CGI scripts do not appear to be protected by random tokens, a common anti-cross-site request forgery (CSRF) protection. The web application might be vulnerable to CSRF attacks. Note that : - Nessus did not exploit the flaw, - Nessus cannot identify sensitive actions -- for example, on an online bank, consulting an account is less sensitive than transferring money. You will have to audit the source of the CGI scripts and check if they are actually affected. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 17744 Plugin Name Family OpenSSH >= 2.3.0 AllowTcpForwarding Port Bouncing Misc. Description: According to its banner, the remote host is running OpenSSH, version 2.3.0 or later. Such versions of OpenSSH allow forwarding TCP connections. If the OpenSSH server is configured to allow anonymous connections (e.g. AnonCVS), remote, unauthenticated users could use the host as a proxy. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 41 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family PHP Symlink Function Race Condition open_basedir Bypass 17717 CGI abuses Severity Total Medium 4 Severity Total Medium 4 Severity Total Medium 1 Description: According to its banner, the version of PHP installed on the remote host is affected by a security bypass vulnerability. A race condition exists in the symlink function that allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Hosts in Repository 'net_10_31_114': 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin Plugin Name Family Apache mod_suexec Multiple Privilege Escalation Vulnerabilities 17693 Web Servers Description: The remote host appears to be running Apache and is potentially affected by the following vulnerabilities: - Multiple race conditions exist in suexec between the validation and usage of directories and files. Under certain conditions local users are able to escalate privileges and execute arbitrary code through the renaming of directories or symlink attacks. (CVE-2007-1741) - Apache's suexec module only performs partial comparisons on paths, which could result in privilege escalation. (CVE-2007-1742) - Apache's suexec module does not properly verify user and group IDs on the command line. When the '/proc' filesystem is mounted, a local user can utilize suexec to escalate privileges. (CVE-2007-1743) Note that this plugin only checks for the presence of Apache, and does not actually check the configuration. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Hosts in Repository 'net_10_31_113': 10.31.113.30 - MAC Address: 96:53:2b:7a:d9:f3 DNS Name: turnkey-worpress.acme.lab Hosts in Repository 'net_10_31_114': 10.31.114.30 - MAC Address: 02:f0:ab:17:b0:dc DNS Name: asp-net-apache 10.31.114.32 - MAC Address: da:80:69:ea:1f:80 DNS Name: drupal7 Plugin 71427 Plugin Name Family PHP 5.4.x < 5.4.23 OpenSSL openssl_ x509_parse() Memory Corruption CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 42 remote host is a version prior to 5.4.23. It is, therefore, potentially affected by a memory corruption flaw in the way the openssl_x509_parse() function of the PHP OpenSSL extension parsed X.509 certificates. A remote attacker could use this flaw to provide a malicious, self-signed certificate or a certificate signed by a trusted authority to a PHP application using the aforementioned function. This could cause the application to crash or possibly allow the attacker to execute arbitrary code with the privileges of the user running the PHP interpreter. Note that this plugin does not attempt to exploit the vulnerability, but instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : libxslt vulnerabilities (USN- Ubuntu Local Security Checks 1595-1) 62435 Severity Total Medium 1 Severity Total Medium 1 Description: Chris Evans discovered that libxslt incorrectly handled generate-id XPath functions. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could obtain potentially sensitive information. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and Ubuntu 11.04. (CVE-2011-1202) It was discovered that libxslt incorrectly parsed certain patterns. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service. (CVE-2011-3970) Nicholas Gregoire discovered that libxslt incorrectly handled unexpected DTD nodes. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service. (CVE-2012-2825) Nicholas Gregoire discovered that libxslt incorrectly managed memory. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service. (CVE-2012-2870) Nicholas Gregoire discovered that libxslt incorrectly handled certain transforms. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service, or possibly execute arbitrary code. (CVE-2012-2871) Cris Neckar discovered that libxslt incorrectly managed memory. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service, or possibly execute arbitrary code. (CVE-2012-2893). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 62434 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / Ubuntu Local Security Checks 12.04 LTS : dbus regressions (USN-1576-2) Description: USN-1576-1 fixed vulnerabilities in DBus. The update caused a regression for certain services launched from the activation helper, and caused an unclean shutdown on upgrade. This update fixes the problem. We apologize for the inconvenience. CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 43 Sebastian Krahmer discovered that DBus incorrectly handled environment variables when running with elevated privileges. A local attacker could possibly exploit this flaw with a setuid binary and gain root privileges. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 11.04 / 11.10 : python2.7 vulnera bilities (USN-1592-1) 62410 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Description: Niels Heinen discovered that the urllib and urllib2 modules would process Location headers that specify a redirection to file: URLs. A remote attacker could exploit this to obtain sensitive information or cause a denial of service. This issue only affected Ubuntu 11.04. (CVE-2011-1521) It was discovered that SimpleHTTPServer did not use a charset parameter in the Content-Type HTTP header. An attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks against Internet Explorer 7 users. This issue only affected Ubuntu 11.04. (CVE-2011-4940) It was discovered that Python distutils contained a race condition when creating the ~/.pypirc file. A local attacker could exploit this to obtain sensitive information. (CVE-2011-4944) It was discovered that SimpleXMLRPCServer did not properly validate its input when handling HTTP POST requests. A remote attacker could exploit this to cause a denial of service via excessive CPU utilization. (CVE-2012-0845) It was discovered that Python was susceptible to hash algorithm attacks. An attacker could cause a denial of service under certian circumstances. This update adds the '-R' command line option and honors setting the PYTHONHASHSEED environment variable to 'random' to salt str and datetime objects with an unpredictable value. (CVE-2012-1150). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 62388 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : eglibc, glibc vulnerabilities Ubuntu Local Security Checks (USN-1589-1) Description: It was discovered that positional arguments to the printf() family of functions were not handled properly in the GNU C Library. An attacker could possibly use this to cause a stack-based buffer overflow, creating a denial of service or possibly execute arbitrary code. (CVE-2012-3404, CVE-2012-3405, CVE-2012-3406) It was discovered that multiple integer overflows existed in the strtod(), strtof() and strtold() functions in the GNU C Library. An attacker could possibly use this to trigger a stack-based buffer overflow, creating a denial of service or possibly execute arbitrary code. (CVE-2012-3480). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 44 Plugin 62366 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : libxml2 vulnerability (USN1587-1) Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Juri Aedla discovered that libxml2 incorrectly handled certain memory operations. If a user or application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause the application to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / Ubuntu Local Security Checks 12.04 LTS : dbus vulnerability (USN-1576-1) 62219 Description: Sebastian Krahmer discovered that DBus incorrectly handled environment variables when running with elevated privileges. A local attacker could possibly exploit this flaw with a setuid binary and gain root privileges. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : mono vulnerabilities (USN-1517-1) 60126 Ubuntu Local Security Checks Description: It was discovered that the Mono System.Web library incorrectly filtered certain error messages related to forbidden files. If a user were tricked into opening a specially crafted URL, an attacker could possibly exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2012-3382) It was discovered that the Mono System.Web library incorrectly handled the EnableViewStateMac property. If a user were tricked into opening a specially crafted URL, an attacker could possibly exploit this to conduct cross-site scripting (XSS) attacks. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-4159). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59395 Plugin Name Family Ubuntu 11.04 / 11.10 : ubuntu-sso-client vulnerability (USN-1464-1) Ubuntu Local Security Checks Description: It was discovered that the Ubuntu Single Sign On Client incorrectly validated server certificates when using HTTPS connections. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to alter or compromise confidential information. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59289 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openssl vulnerabilities (USNUbuntu Local Security Checks 1451-1) Description: Ivan Nestlerode discovered that the Cryptographic Message Syntax (CMS) CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 45 and PKCS #7 implementations in OpenSSL returned early if RSA decryption failed. This could allow an attacker to expose sensitive information via a Million Message Attack (MMA). (CVE-2012-0884) It was discovered that an integer underflow was possible when using TLS 1.1, TLS 1.2, or DTLS with CBC encryption. This could allow a remote attacker to cause a denial of service. (CVE-2012-2333). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59225 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : libxml2 vulnerability (USN1447-1) Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Juri Aedla discovered that libxml2 contained an off by one error in its XPointer functionality. If a user or application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause the application to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 Ubuntu Local Security Checks vulnerabilities (USN-1427-1) 58872 Description: Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.62 in Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.96. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html http://dev.mysql.com/doc/refman/5.0/en/news-5-0-96.html Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : libpng vulnerability (USN-1417-1) 58617 Ubuntu Local Security Checks Description: It was discovered that libpng incorrectly handled certain memory operations. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58600 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : tiff vulnerabilities (USN-1416-1) Ubuntu Local Security Checks Description: Alexander Gavrun discovered that the TIFF library incorrectly CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 46 allocated space for a tile. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could execute arbitrary code with user privileges, or crash the application, leading to a denial of service. (CVE-2012-1173) It was discovered that the tiffdump utility incorrectly handled directory data structures with many directory entries. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. This issue only applied to Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2010-4665). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. Ubuntu Local Security Checks 04 / 11.10 : libpng vulnerability (USN-1402-1) 58443 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: It was discovered that libpng did not properly process compressed chunks. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : update-manager regression (USN-1284-2) 57997 Ubuntu Local Security Checks Description: USN-1284-1 fixed vulnerabilities in Update Manager. One of the fixes introduced a regression for Kubuntu users attempting to upgrade to a newer Ubuntu release. This update fixes the problem. We apologize for the inconvenience. David Black discovered that Update Manager incorrectly extracted the downloaded upgrade tarball before verifying its GPG signature. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to replace arbitrary files. (CVE-2011-3152) David Black discovered that Update Manager created a temporary directory in an insecure fashion. A local attacker could possibly use this flaw to read the XAUTHORITY file of the user performing the upgrade. (CVE-2011-3154) This update also adds a hotfix to Update Notifier to handle cases where the upgrade is being performed from CD media. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57698 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 : evince vulnerability (USN-1347-1) Ubuntu Local Security Checks Description: It was discovered that Evince did not properly parse AFM font files when processing DVI files. If a user were tricked into opening a specially crafted DVI file, an attacker could cause Evince to crash or potentially execute arbitrary code with the privileges of the user CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 47 invoking the program. In the default installation, attackers would be isolated by the Evince AppArmor profile. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : t1lib Ubuntu Local Security Checks vulnerability (USN-1316-1) 57370 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: Jonathan Brossard discovered that t1lib did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause t1lib to crash or possibly execute arbitrary code with user privileges. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : jasper vulnerabilities (USN-1315-1) 57357 Ubuntu Local Security Checks Description: Jonathan Foote discovered that JasPer incorrectly handled certain malformed JPEG-2000 image files. If a user were tricked into opening a specially crafted JPEG-2000 image file, a remote attacker could cause JasPer to crash or possibly execute arbitrary code with user privileges. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : libarchive vulnerabilities (USN-1310-1) 57341 Ubuntu Local Security Checks Description: It was discovered that libarchive incorrectly handled certain ISO 9660 image files. If a user were tricked into using a specially crafted ISO 9660 image file, a remote attacker could cause libarchive to crash or possibly execute arbitrary code with user privileges. (CVE-2011-1777) It was discovered that libarchive incorrectly handled certain tar archive files. If a user were tricked into using a specially crafted tar file, a remote attacker could cause libarchive to crash or possibly execute arbitrary code with user privileges. (CVE-2011-1778). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57314 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : php5 vulnerability (USN-1307-1) Ubuntu Local Security Checks Description: Florent Hochwelker discovered that PHP incorrectly handled certain EXIF headers in JPEG files. A remote attacker could exploit this issue to view sensitive information or cause the PHP server to crash. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 48 Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : update-manager vulnerabilities (USN-1284-1) 56971 Ubuntu Local Security Checks Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: David Black discovered that Update Manager incorrectly extracted the downloaded upgrade tarball before verifying its GPG signature. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to replace arbitrary files. (CVE-2011-3152) David Black discovered that Update Manager created a temporary directory in an insecure fashion. A local attacker could possibly use this flaw to read the XAUTHORITY file of the user performing the upgrade. (CVE-2011-3154) This update also adds a hotfix to Update Notifier to handle cases where the upgrade is being performed from CD media. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.10 / 11.04 / 11.10 : softwarecenter vulnerability (USN-1270-1) 56912 Ubuntu Local Security Checks Description: David B. discovered that Software Center incorrectly validated server certificates when performing secure connections. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to view sensitive information or install altered packages and repositories. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56629 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. Ubuntu Local Security Checks 04 / 11.10 : pam vulnerabilities (USN-1237-1) Description: Kees Cook discovered that the PAM pam_env module incorrectly handled certain malformed environment files. A local attacker could use this flaw to cause a denial of service, or possibly gain privileges. The default compiler options for affected releases should reduce the vulnerability to a denial of service. (CVE-2011-3148) Kees Cook discovered that the PAM pam_env module incorrectly handled variable expansion. A local attacker could use this flaw to cause a denial of service. (CVE-2011-3149) Stephane Chazelas discovered that the PAM pam_motd module incorrectly cleaned the environment during execution of the motd scripts. In certain environments, a local attacker could use this to execute arbitrary code as root, and gain privileges. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56194 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 : librsvg vulnerability (USN-1206-1) Ubuntu Local Security Checks Description: Sauli Pahlman discovered that librsvg did not correctly handle malformed filter names. If a user or automated system were tricked into processing a specially crafted SVG image, a remote attacker could gain user privileges. CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 49 Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 26057 Plugin Name Family lighttpd mod_fastcgi HTTP Request Header Remote Overflow Web Servers Severity Total Medium 1 Severity Total Medium 1 Severity Total Medium 1 Description: The remote web server appears to be lighttpd running with the FastCGI module (mod_fastcgi). The version of that module on the remote host appears to be affected by a buffer overflow vulnerability. By sending a specially crafted request with a long header, a remote attacker may be able to exploit this issue to add or replace headers passed to PHP, such as SCRIPT_FILENAME, which in turn could result in arbitrary code execution. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 19782 Plugin Name Family FTP Writable Directories FTP Description: By crawling through the remote FTP server, Nessus discovered several directories were marked as being world-writable. This could have several negative impacts : * Temporary file uploads are sometimes immediately available to all anonymous users, allowing the FTP server to be used as a 'drop' point. This may facilitate trading copyrighted, pornographic or questionable material. * A user may be able to upload large files that consume disk space, resulting in a denial of service condition. * A user can upload a malicious program. If an administrator routinely checks the 'incoming' directory, they may load a document or run a program that exploits a vulnerability in client software. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 17301 Plugin Name Family phpBB <= 2.0.13 Multiple Vulnerabilities CGI abuses Description: According to its banner, the remote host is running a version of phpBB that suffers from multiple flaws: - A Path Disclosure Vulnerability A remote attacker can cause phpBB to reveal its installation path via a direct request to the script 'db/oracle.php'. - A Cross-Site Scripting Vulnerability The application does not properly sanitize user input before using it in 'privmsg.php' and 'viewtopic.php'. - A Privilege Escalation Vulnerability In 'session.php' phpBB resets the 'user_id' value when an autologin fails; it does not, however, reset the 'user_level' value, which remains as the account that failed the autologin. Since the software uses the 'user_level' parameter in some cases to control access to privileged functionality, this flaw CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 50 allows an attacker to view information, and possibly even perform tasks, normally limited to administrators. - SQL Injection Vulnerabilities The DLMan Pro and LinksLinks Pro mods, if installed, reportedly fail to properly sanitize user input to the 'file_id' parameter of the 'dlman.php' script and the 'id' parameter of the 'links.php' script respectively before using it in a SQL query. This may allow an attacker to pass malicious input to database queries. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family OpenSSL < 0.9.8x / < 1.0.0j / < 1.0.1c Remote Denial of Service Vulnerability 8064 Web Servers Severity Total Medium 1 Description: OpenSSL before 0.9.8x, 1.0.0.j, or 1.0.1c contains an integer underflow condition which may result in a denial of service. A remote attacker could send a specially crafted TLS request causing the affected application to crash causing denial of service to legitimate users. The integer underflow is seen in TLS 1.1, TLS 1.2, and DTLS when handling CBC mode ciphersuites. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family PHP < 5.4.16 / 5.3.26 Heap Based Buffer Overflow Vulnerability 6866 Web Servers Severity Total Medium 1 Description: PHP versions earlier than 5.4.16 and 5.3.26 are affected by a heap based buffer overflow vulnerability due to lack of user input sanitation when parsing strings. (An additional security vulnerability exists while parsing 'mimetype' for MP3 files, which can be exploited to cause a crash in version 5.4.15.) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache Tomcat 6.0.x < 6.0.37 Multiple Vulnerabilities 6832 Web Servers Severity Total Medium 1 Description: Versions of Apache Tomcat earlier than 6.0.37 are potentially affected by multiple vulnerabilities : - An error exists related to chunked transfer encoding and extensions that could allow limited denial of service attacks. (CVE-2012-3544) - An error exists related to HTML form authentication and session fixation that could allow an attacker to carry out requests using a victim's credentials. (CVE-2013-2067) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6657 Plugin Name Family Apache Tomcat 6.0.x < 6.0.36 Multiple Vulnerabilities Web Servers Severity Total Medium 1 Description: Apache Tomcat versions earlier than 6.0.36 are potentially affected by multiple vulnerabilities : - A flaw exists within the parseHeaders() function that could allow for a crafted header to cause a remote denial of service. (CVE-2012-2733) - An error exists related to FORM authentication that can allow security bypass if 'j_security_check' is appended to the request. (CVE-2012-3546) - An error exists in the file 'filters/CsrfPreventionFilter.java' that can allow cross-site request forgery (CSRF) attacks to bypass the filtering. This can allow access to protected resources without a session identifier. (CVE-2012-4431) - An error exists related to the 'NIO' connector when HTTPS and 'sendfile' are enabled that can force the application into an infinite loop. (CVE-2012-4534) CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 51 - Replay-countermeasure functionality in HTTP Digest Access Authentication tracks cnonce values instead of nonce values, which makes it easier for attackers to bypass access restrictions by sniffing the network for valid requests. (CVE-2012-5885) - HTTP Digest Access Authentication implementation caches information about the authenticated user, which could potentially allow an attacker to bypass authentication via session ID. (CVE-2012-5886) - HTTP Digest Access Authentication implementation does not properly check for stale nonce values with enforcement of proper credentials, which allows an attacker to bypass restrictions by sniffing requests. (CVE-2012-5887) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache 2.2 < 2.2.23 Multiple Vulnerabilitie Web Servers s 6576 Severity Total Medium 1 Description: Apache versions earlier than 2.2.23 are affected by the following vulnerabilities. - The utility 'apachectl' can receive a zero-length directory name in the LD_LIBRARY_PATH via the 'envvars' file. A local attacker with access to that utility could exploit this to load a malicious Dynamic Shared Object (DSO), leading to arbitrary code execution. (CVE-2012-0883) - An input validation error exists related to 'mod_negotiation', 'Multiviews' and untrusted uploads that can allow cross-site scripting attacks. (CVE-2012-2687) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 5782 Plugin Name Family OpenSSL < 0.9.8r / 1.0.0d OCSP Stapling Denial of Service Web Servers Severity Total Medium 1 Description: Versions of OpenSSL earlier than 0.9.8r and 1.0.0d are potentially affected by a vulnerability wherein an incorrectly formatted ClientHello handshake message could cause OpenSSL to parse past the end of the message which could cause the web server to crash. There is also the potential for information disclosure if OCSP nonce extensions are used. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 6.0 to 6.9 Qualitative Risk Analysis with CVSS Scores 52 CVSS 7.0 to 7.9 The Top 15 Host with CVSS 7.0 to 7.9 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 7.0 to 7.9. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 7.0 to 7.9 Vulnerabilities IP Address DNS Name OS CPE 10.31.112.10 ubuntu cpe:/o:canonical:ubuntu_ linux:11.04 10.31.113.32 openldap cpe:/o:debian:debian_ linux:7.2 Score 556 10 Vulns 55 2 1 The Top 10 Subnets CVSS 7.0 to 7.9 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 7.0 to 7.9 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 7.0 to 7.9; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 7.0 to 7.9 Vulnerabilities CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 53 The Top 10 Plugin Families Detecting CVSS 7.0 to 7.9 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 7.0 to 7.9 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 7.0 to 7.9 Vulnerabilities CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 54 The Details for CVSS 7.0 to 7.9 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 7.0 to 7.9 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories. Details for CVSS 7.0 to 7.9 Vulnerabilities with Affected Hosts Plugin 66843 Plugin Name Family PHP 5.4.x < 5.4.16 Multiple Vulnerabilities CGI abuses Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: According to its banner, the version of PHP 5.4.x installed on the remote host is prior to 5.4.16. It is, therefore, potentially affected by the following vulnerabilities: - An error exists in the mimetype detection of 'mp3' files that could lead to a denial of service. (Bug #64830) - An error exists in the function 'php_quot_print_encode' in the file 'ext/standard/quot_print.c' that could allow a heap-based buffer overflow when attempting to parse certain strings. (Bug #64879) - An integer overflow error exists related to the value of 'JEWISH_SDN_MAX' in the file 'ext/calendar/jewish.c' that could allow denial of service attacks. (Bug #64895) Note that this plugin does not attempt to exploit these vulnerabilities, but instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 62495 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / Ubuntu Local Security Checks 12.04 LTS : bind9 vulnerability (USN-1601-1) Description: Jake Montgomery discovered that Bind incorrectly handled certain specific combinations of RDATA. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 62180 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : dhcp3, isc-dhcp vulnerability (USN1571-1) Ubuntu Local Security Checks Description: Glen Eustace discovered that the DHCP server incorrectly handled IPv6 expiration times. A remote attacker could use this issue to cause DHCP to crash, resulting in a denial of service. This issue only affected Ubuntu 11.04, Ubuntu 11.10 and Ubuntu 12.04 LTS. (CVE-2012-3955) Dan Rosenberg discovered that the DHCP AppArmor profile could be escaped by using environment variables. This update mitigates the issue by sanitizing certain variables in the DHCP shell scripts. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 55 Plugin 62098 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : bind9 vulnerability (USN-1566- Ubuntu Local Security Checks 1) Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: It was discovered that Bind incorrectly handled certain specially crafted long resource records. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 11.04 / 11.10 / 12.04 LTS : libreoffice Ubuntu Local Security Checks vulnerability (USN-1536-1) 61525 Description: It was discovered that LibreOffice incorrectly handled certain encryption tags in Open Document Text (.odt) files. If a user were tricked into opening a specially crafted file, an attacker could cause LibreOffice to crash or possibly execute arbitrary code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : bind9 vulnerability (USN-1518-1) 60136 Ubuntu Local Security Checks Description: Einar Lonn discovered that Bind incorrectly initialized the failing-query cache. A remote attacker could use this flaw to cause Bind to crash, resulting in a denial of service. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 60105 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : libexif vulnerabilities (USN- Ubuntu Local Security Checks 1513-1) Description: Mateusz Jurczyk discovered that libexif incorrectly parsed certain malformed EXIF tags. If a user or automated system were tricked into processing a specially crafted image file, an attacker could cause libexif to crash, leading to a denial of service, or possibly obtain sensitive information. (CVE-2012-2812, CVE-2012-2813) Mateusz Jurczyk discovered that libexif incorrectly parsed certain malformed EXIF tags. If a user or automated system were tricked into processing a specially crafted image file, an attacker could cause libexif to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2012-2814) Yunho Kim discovered that libexif incorrectly parsed certain malformed EXIF tags. If a user or automated system were tricked into processing a specially crafted image file, an attacker could cause libexif to crash, leading to a denial of service, or possibly obtain sensitive information. (CVE-2012-2836) Yunho Kim discovered that libexif incorrectly parsed certain malformed EXIF tags. If a user or automated system were tricked into processing a specially crafted image file, an attacker could cause libexif to crash, leading to a denial of service. (CVE-2012-2837) Dan Fandrich discovered that libexif incorrectly parsed certain CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 56 malformed EXIF tags. If a user or automated system were tricked into processing a specially crafted image file, an attacker could cause libexif to crash, leading to a denial of service, or possibly execute arbitrary code. (CVE-2012-2840, CVE-2012-2841). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59903 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : pidgin vulnerabilities (USN-1500-1) Ubuntu Local Security Checks Severity Total High 1 Description: Evgeny Boger discovered that Pidgin incorrectly handled buddy list messages in the AIM and ICQ protocol handlers. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2011-4601) Thijs Alkemade discovered that Pidgin incorrectly handled malformed voice and video chat requests in the XMPP protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2011-4602) Diego Bauche Madero discovered that Pidgin incorrectly handled UTF-8 sequences in the SILC protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2011-4603) Julia Lawall discovered that Pidgin incorrectly cleared memory contents used in cryptographic operations. An attacker could exploit this to read the memory contents, leading to an information disclosure. This issue only affected Ubuntu 10.04 LTS. (CVE-2011-4922) Clemens Huebner and Kevin Stange discovered that Pidgin incorrectly handled nickname changes inside chat rooms in the XMPP protocol handler. A remote attacker could exploit this by changing nicknames, leading to a denial of service. This issue only affected Ubuntu 11.10. (CVE-2011-4939) Thijs Alkemade discovered that Pidgin incorrectly handled off-line instant messages in the MSN protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 10.04 LTS, 11.04 and 11.10. (CVE-2012-1178) José Valentín Gutiérrez discovered that Pidgin incorrectly handled SOCKS5 proxy connections during file transfer requests in the XMPP protocol handler. A remote attacker could send a specially crafted request and cause Pidgin to crash, leading to a denial of service. This issue only affected Ubuntu 12.04 LTS and 11.10. (CVE-2012-2214) Fabian Yamaguchi discovered that Pidgin incorrectly handled malformed messages in the MSN protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash, leading to a denial of service. (CVE-2012-2318) Ulf Härnhammar discovered that Pidgin incorrectly handled messages with in-line images in the MXit protocol handler. A remote attacker could send a specially crafted message and possibly execute arbitrary code with user privileges. (CVE-2012-3374). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 57 Plugin 59856 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / Ubuntu Local Security Checks 12.04 LTS : tiff vulnerabilities (USN-1498-1) Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: It was discovered that the TIFF library incorrectly handled certain malformed TIFF images. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. (CVE-2012-2088) It was discovered that the tiff2pdf utility incorrectly handled certain malformed TIFF images. If a user or automated system were tricked into opening a specially crafted TIFF image, a remote attacker could crash the application, leading to a denial of service, or possibly execute arbitrary code with user privileges. (CVE-2012-2113). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59832 Plugin Name Family Ubuntu 11.04 / 11.10 : libreoffice, libreofficeUbuntu Local Security Checks l10n vulnerabilities (USN-1495-1) Description: Integer overflows were discovered in the graphics loading code of several different image types. If a user were tricked into opening a specially crafted file, an attacker could cause LibreOffice to crash or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2012-1149) Sven Jacobi discovered an integer overflow when processing Escher graphics records. If a user were tricked into opening a specially crafted PowerPoint file, an attacker could cause LibreOffice to crash or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2012-2334). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59603 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : php5 vulnerabilities (USN-1481- Ubuntu Local Security Checks 1) Description: It was discovered that PHP incorrectly handled certain Tidy::diagnose operations on invalid objects. A remote attacker could use this flaw to cause PHP to crash, leading to a denial of service. (CVE-2012-0781) It was discovered that PHP incorrectly handled certain multi-file upload filenames. A remote attacker could use this flaw to cause a denial of service, or to perform a directory traversal attack. (CVE-2012-1172) Rubin Xu and Joseph Bonneau discovered that PHP incorrectly handled certain Unicode characters in passwords passed to the crypt() function. A remote attacker could possibly use this flaw to bypass authentication. (CVE-2012-2143) It was discovered that a Debian/Ubuntu specific patch caused PHP to incorrectly handle empty salt strings. A remote attacker could possibly use this flaw to bypass authentication. This issue only affected Ubuntu 10.04 LTS and Ubuntu 11.04. (CVE-2012-2317) It was discovered that PHP, when used as a stand alone CGI processor for the Apache Web Server, did not properly parse and filter query strings. This could allow a remote attacker to execute arbitrary code running with the privilege of the web server, or to perform a denial CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 58 of service. Configurations using mod_php5 and FastCGI were not vulnerable. (CVE-2012-2335, CVE-2012-2336) Alexander Gavrun discovered that the PHP Phar extension incorrectly handled certain malformed TAR files. A remote attacker could use this flaw to perform a denial of service, or possibly execute arbitrary code. (CVE-2012-2386). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : ubuntuone-storage-protocol update (USN-1465-2) 59397 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: USN-1465-1 fixed a vulnerability in the Ubuntu One Client. This update adds a required fix to the Ubuntu One storage protocol library. It was discovered that the Ubuntu One Client incorrectly validated server certificates when using HTTPS connections. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to alter or compromise confidential information. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59396 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : ubuntuone-client vulnerability (USN1465-1) Ubuntu Local Security Checks Description: It was discovered that the Ubuntu One Client incorrectly validated server certificates when using HTTPS connections. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to alter or compromise confidential information. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / Ubuntu Local Security Checks 12.04 LTS : sudo vulnerability (USN-1442-1) 59170 Description: It was discovered that sudo incorrectly handled network masks when using Host and Host_List. A local user who is listed in sudoers may be allowed to run commands on unintended hosts when IPv4 network masks are used to grant access. A local attacker could exploit this to bypass intended access restrictions. Host and Host_List are not used in the default installation of Ubuntu. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58873 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : Ubuntu Local Security Checks openssl vulnerability (USN-1428-1) Description: It was discovered that the fix for CVE-2012-2110 was incomplete for OpenSSL 0.9.8. A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. Ubuntu 11.10 was not affected by this issue. (CVE-2012-2131) The original upstream fix for CVE-2012-2110 would cause CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 59 BUF_MEM_grow_clean() to sometimes return the wrong error condition. This update fixes the problem. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58808 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : Ubuntu Local Security Checks openssl vulnerabilities (USN-1424-1) Severity Total High 1 Severity Total High 1 Description: It was discovered that OpenSSL could be made to dereference a NULL pointer when processing S/MIME messages. A remote attacker could use this to cause a denial of service. These issues did not affect Ubuntu 8.04 LTS. (CVE-2006-7250, CVE-2012-1165) Tavis Ormandy discovered that OpenSSL did not properly perform bounds checking when processing DER data via BIO or FILE functions. A remote attacker could trigger this flaw in services that used SSL to cause a denial of service or possibly execute arbitrary code with application privileges. (CVE-2012-2110). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58318 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : eglibc, glibc vulnerabilities (USN-1396-1) Ubuntu Local Security Checks Description: It was discovered that the GNU C Library did not properly handle integer overflows in the timezone handling code. An attacker could use this to possibly execute arbitrary code by convincing an application to load a maliciously constructed tzfile. (CVE-2009-5029) It was discovered that the GNU C Library did not properly handle passwd.adjunct.byname map entries in the Network Information Service (NIS) code in the name service caching daemon (nscd). An attacker could use this to obtain the encrypted passwords of NIS accounts. This issue only affected Ubuntu 8.04 LTS. (CVE-2010-0015) Chris Evans reported that the GNU C Library did not properly calculate the amount of memory to allocate in the fnmatch() code. An attacker could use this to cause a denial of service or possibly execute arbitrary code via a maliciously crafted UTF-8 string. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and Ubuntu 10.10. (CVE-2011-1071) Tomas Hoger reported that an additional integer overflow was possible in the GNU C Library fnmatch() code. An attacker could use this to cause a denial of service via a maliciously crafted UTF-8 string. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1659) Dan Rosenberg discovered that the addmntent() function in the GNU C Library did not report an error status for failed attempts to write to the /etc/mtab file. This could allow an attacker to corrupt /etc/mtab, possibly causing a denial of service or otherwise manipulate mount options. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1089) Harald van Dijk discovered that the locale program included with the GNU C library did not properly quote its output. This could allow a local attacker to possibly execute arbitrary code using a crafted localization string that was evaluated in a shell script. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and Ubuntu 10.10. (CVE-2011-1095) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 60 It was discovered that the GNU C library loader expanded the $ORIGIN dynamic string token when RPATH is composed entirely of this token. This could allow an attacker to gain privilege via a setuid program that had this RPATH value. (CVE-2011-1658) It was discovered that the GNU C library implementation of memcpy optimized for Supplemental Streaming SIMD Extensions 3 (SSSE3) contained a possible integer overflow. An attacker could use this to cause a denial of service or possibly execute arbitrary code. This issue only affected Ubuntu 10.04 LTS. (CVE-2011-2702) John Zimmerman discovered that the Remote Procedure Call (RPC) implementation in the GNU C Library did not properly handle large numbers of connections. This could allow a remote attacker to cause a denial of service. (CVE-2011-4609) It was discovered that the GNU C Library vfprintf() implementation contained a possible integer overflow in the format string protection code offered by FORTIFY_SOURCE. An attacker could use this flaw in conjunction with a format string vulnerability to bypass the format string protection and possibly execute arbitrary code. (CVE-2012-0864). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : python-pam vulnerability (USN-1395-1) 58301 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: Markus Vervier discovered that PyPAM incorrectly handled passwords containing NULL bytes. An attacker could exploit this to cause applications using PyPAM to crash, or possibly execute arbitrary code. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58034 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerability (USN-1367-2) Ubuntu Local Security Checks Description: USN-1367-1 fixed vulnerabilities in libpng. This provides the corresponding update for Firefox. Jueri Aedla discovered that libpng did not properly verify the size used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57998 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : libpng vulnerabilities (USN1367-1) Ubuntu Local Security Checks Description: It was discovered that libpng did not properly verify the embedded profile length of iCCP chunks. An attacker could exploit this to cause a denial of service via application crash. This issue only affected Ubuntu 8.04 LTS. (CVE-2009-5063) Jueri Aedla discovered that libpng did not properly verify the size CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 61 used when allocating memory during chunk decompression. If a user or automated system using libpng were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or execute code with the privileges of the user invoking the program. (CVE-2011-3026). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerability (USN-1360-1) 57934 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Description: Andrew McCreight and Olli Pettay discovered a use-after-free vulnerability in the XBL bindings. An attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0452). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57932 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : php5 regression (USN-1358-2) Ubuntu Local Security Checks Description: USN 1358-1 fixed multiple vulnerabilities in PHP. The fix for CVE-2012-0831 introduced a regression where the state of the magic_quotes_gpc setting was not correctly reflected when calling the ini_get() function. We apologize for the inconvenience. It was discovered that PHP computed hash values for form parameters without restricting the ability to trigger hash collisions predictably. This could allow a remote attacker to cause a denial of service by sending many crafted parameters. (CVE-2011-4885) ATTENTION: this update changes previous PHP behavior by limiting the number of external input variables to 1000. This may be increased by adding a 'max_input_vars' directive to the php.ini configuration file. See http://www.php.net/manual/en/info.configuration.php#ini.maxinput-vars for more information. Stefan Esser discovered that the fix to address the predictable hash collision issue, CVE-2011-4885, did not properly handle the situation where the limit was reached. This could allow a remote attacker to cause a denial of service or execute arbitrary code via a request containing a large number of variables. (CVE-2012-0830) It was discovered that PHP did not always check the return value of the zend_strndup function. This could allow a remote attacker to cause a denial of service. (CVE-2011-4153) It was discovered that PHP did not properly enforce libxslt security settings. This could allow a remote attacker to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension. (CVE-2012-0057) It was discovered that PHP did not properly enforce that PDORow objects could not be serialized and not be saved in a session. A remote attacker could use this to cause a denial of service via an application crash. (CVE-2012-0788) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 62 It was discovered that PHP allowed the magic_quotes_gpc setting to be disabled remotely. This could allow a remote attacker to bypass restrictions that could prevent an SQL injection. (CVE-2012-0831) USN 1126-1 addressed an issue where the /etc/cron.d/php5 cron job for PHP allowed local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/. Emese Revfy discovered that the fix had not been applied to PHP for Ubuntu 10.04 LTS. This update corrects the issue. We apologize for the error. (CVE-2011-0441). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57888 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : php5 vulnerabilities (USN-1358- Ubuntu Local Security Checks 1) Severity Total High 1 Description: It was discovered that PHP computed hash values for form parameters without restricting the ability to trigger hash collisions predictably. This could allow a remote attacker to cause a denial of service by sending many crafted parameters. (CVE-2011-4885) ATTENTION: this update changes previous PHP behavior by limiting the number of external input variables to 1000. This may be increased by adding a 'max_input_vars' directive to the php.ini configuration file. See http://www.php.net/manual/en/info.configuration.php#ini.max-input-vars for more information. Stefan Esser discovered that the fix to address the predictable hash collision issue, CVE-2011-4885, did not properly handle the situation where the limit was reached. This could allow a remote attacker to cause a denial of service or execute arbitrary code via a request containing a large number of variables. (CVE-2012-0830) It was discovered that PHP did not always check the return value of the zend_strndup function. This could allow a remote attacker to cause a denial of service. (CVE-2011-4153) It was discovered that PHP did not properly enforce libxslt security settings. This could allow a remote attacker to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension. (CVE-2012-0057) It was discovered that PHP did not properly enforce that PDORow objects could not be serialized and not be saved in a session. A remote attacker could use this to cause a denial of service via an application crash. (CVE-2012-0788) It was discovered that PHP allowed the magic_quotes_gpc setting to be disabled remotely. This could allow a remote attacker to bypass restrictions that could prevent an SQL injection. (CVE-2012-0831) USN 1126-1 addressed an issue where the /etc/cron.d/php5 cron job for PHP allowed local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/. Emese Revfy discovered that the fix had not been applied to PHP for Ubuntu 10.04 LTS. This update corrects the issue. We apologize for the error. (CVE-2011-0441). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 63 Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : icu vulnerability (USN-1348-1) 57706 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: It was discovered that ICU did not properly handle invalid locale data during Unicode conversion. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.10 / 11.04 / 11.10 : curl vulnera bility (USN-1346-1) 57689 Ubuntu Local Security Checks Description: Dan Fandrich discovered that curl incorrectly handled URLs containing embedded or percent-encoded control characters. If a user or automated system were tricked into processing a specially crafted URL, arbitrary data could be injected. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : t1lib Ubuntu Local Security Checks vulnerabilities (USN-1335-1) 57616 Description: Jon Larimer discovered that t1lib did not properly parse AFM fonts. If a user were tricked into using a specially crafted font file, a remote attacker could cause t1lib to crash or possibly execute arbitrary code with user privileges. (CVE-2010-2642, CVE-2011-0433) Jonathan Brossard discovered that t1lib did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause t1lib to crash. (CVE-2011-1552, CVE-2011-1553, CVE-2011-1554). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : vsftpd vulnerability (USN-1288-1) 57038 Ubuntu Local Security Checks Description: It was discovered that the 2.6.35 and earlier Linux kernel does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) in applications that require a separate namespace per connection, like vsftpd. This update adjusts vsftpd to only use network namespaces on kernels that are known to be not affected. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56868 Plugin Name Family Ubuntu 11.04 / 11.10 : system-config-printer vulnerability (USN-1265-1) Ubuntu Local Security Checks Description: Marc Deslauriers discovered that system-config-printer's cupshelpers scripts used by the Ubuntu automatic printer driver download service queried the OpenPrinting database using an insecure connection. If a CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 64 remote attacker were able to perform a man-in-the-middle attack, this flaw could be exploited to install altered packages and repositories. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : tomcat6 vulnerabilities (USN-1252-1) 56746 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Description: It was discovered that Tomcat incorrectly implemented HTTP DIGEST authentication. An attacker could use this flaw to perform a variety of authentication attacks. (CVE-2011-1184) Polina Genova discovered that Tomcat incorrectly created log entries with passwords when encountering errors during JMX user creation. A local attacker could possibly use this flaw to obtain sensitive information. This issue only affected Ubuntu 10.04 LTS, 10.10 and 11.04. (CVE-2011-2204) It was discovered that Tomcat incorrectly validated certain request attributes when sendfile is enabled. A local attacker could bypass intended restrictions, or cause the JVM to crash, resulting in a denial of service. (CVE-2011-2526) It was discovered that Tomcat incorrectly handled certain AJP requests. A remote attacker could use this flaw to spoof requests, bypass authentication, and obtain sensitive information. This issue only affected Ubuntu 10.04 LTS, 10.10 and 11.04. (CVE-2011-3190). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56554 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. Ubuntu Local Security Checks 04 / 11.10 : php5 vulnerabilities (USN-1231-1) Description: Mateusz Kocielski, Marek Kroemeke and Filip Palian discovered that a stack-based buffer overflow existed in the socket_connect function's handling of long pathnames for AF_UNIX sockets. A remote attacker might be able to exploit this to execute arbitrary code; however, the default compiler options for affected releases should reduce the vulnerability to a denial of service. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1938) Krzysztof Kotowicz discovered that the PHP post handler function does not properly restrict filenames in multipart/form-data POST requests. This may allow remote attackers to conduct absolute path traversal attacks and possibly create or overwrite arbitrary files. This issue affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-2202) It was discovered that the crypt function for blowfish does not properly handle 8-bit characters. This could make it easier for an attacker to discover a cleartext password containing an 8-bit character that has a matching blowfish crypt value. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-2483) It was discovered that PHP did not properly check the return values of the malloc(3), calloc(3) and realloc(3) library functions in multiple locations. This could allow an attacker to cause a denial of service via a NULL pointer dereference or possibly execute arbitrary code. This issue affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-3182) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 65 Maksymilian Arciemowicz discovered that PHP did not properly implement the error_log function. This could allow an attacker to cause a denial of service via an application crash. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. (CVE-2011-3267) Maksymilian Arciemowicz discovered that the ZipArchive functions addGlob() and addPattern() did not properly check their flag arguments. This could allow a malicious script author to cause a denial of service via application crash. This issue affected Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. (CVE-2011-1657) It was discovered that the Xend opcode parser in PHP could be interrupted while handling the shift-left, shift-right, and bitwise-xor opcodes. This could allow a malicious script author to expose memory contents. This issue affected Ubuntu 10.04 LTS. (CVE-2010-1914) It was discovered that the strrchr function in PHP could be interrupted by a malicious script, allowing the exposure of memory contents. This issue affected Ubuntu 8.04 LTS. (CVE-2010-2484). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56256 Plugin Name Family Ubuntu 11.04 : linux vulnerabilities (USN1211-1) Ubuntu Local Security Checks Severity Total High 1 Description: It was discovered that the /proc filesystem did not correctly handle permission changes when programs executed. A local attacker could hold open files to examine details about programs running with higher privileges, potentially increasing the chances of exploiting additional vulnerabilities. (CVE-2011-1020) Dan Rosenberg discovered that the X.25 Rose network stack did not correctly handle certain fields. If a system was running with Rose enabled, a remote attacker could send specially crafted traffic to gain root privileges. (CVE-2011-1493) Vasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not correctly check the origin of mount points. A local attacker could exploit this to trick the system into unmounting arbitrary mount points, leading to a denial of service. (CVE-2011-1833) It was discovered that Bluetooth l2cap and rfcomm did not correctly initialize structures. A local attacker could exploit this to read portions of the kernel stack, leading to a loss of privacy. (CVE-2011-2492) It was discovered that GFS2 did not correctly check block sizes. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2689) Fernando Gont discovered that the IPv6 stack used predictable fragment identification numbers. A remote attacker could exploit this to exhaust network resources, leading to a denial of service. (CVE-2011-2699) The performance counter subsystem did not correctly handle certain counters. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2918) A flaw was found in the Linux kernel's /proc/*/*map* interface. A local, unprivileged user could exploit this flaw to cause a denial of service. (CVE-2011-3637) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 66 Ben Hutchings discovered several flaws in the Linux Rose (X.25 PLP) layer. A local user or a remote user on an X.25 network could exploit these flaws to execute arbitrary code as root. (CVE-2011-4914). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56048 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 : apache2 vulnerability (USN-1199-1) Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: A flaw was discovered in the byterange filter in Apache. A remote attacker could exploit this to cause a denial of service via resource exhaustion. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 55976 Plugin Name Family Apache HTTP Server Byte Range DoS Web Servers Description: The version of Apache HTTP Server running on the remote host is affected by a denial of service vulnerability. Making a series of HTTP requests with overlapping ranges in the Range or Request-Range request headers can result in memory and CPU exhaustion. A remote, unauthenticated attacker could exploit this to make the system unresponsive. Exploit code is publicly available and attacks have reportedly been observed in the wild. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 26925 Plugin Name Family VNC Server Unauthenticated Access Misc. Description: The VNC server installed on the remote host allows an attacker to connect to the remote host as no authentication is required to access this service. ** The VNC server sometimes sends the connected user to the XDM login ** screen. Unfortunately, Nessus cannot identify this situation. ** In such a case, it is not possible to go further without valid ** credentials and this alert may be ignored. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 15780 Plugin Name Family phpBB viewtopic.php highlight Parameter SQL Injection CGI abuses Description: The remote host is running phpBB. There is a flaw in the remote software that could allow anyone to inject arbitrary SQL commands in the login form. An attacker could exploit this flaw to bypass the authentication of the remote host or execute arbitrary SQL statements against the remote database. Hosts in Repository 'net_10_31_112': CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 67 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 13655 Plugin Name Family phpBB < 2.0.9 Multiple Vulnerabilities CGI abuses Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total High 1 Severity Total Medium 1 Description: The remote host is running a version of phpBB older than 2.0.9. There is a flaw in the remote software that may allow anyone to inject arbitrary SQL commands, which may in turn be used to gain administrative access on the remote host or to obtain the MD5 hash of the password of any user. One vulnerability is reported to exist in 'admin_board.php'. The other pertains to improper characters in the session id variable. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family phpBB < 2.0.7 Multiple Script SQL Injecti on 11938 CGI abuses Description: The remote host is running a version of phpBB older than 2.0.7. There is a flaw in the remote software that could allow anyone to inject arbitrary SQL commands, which may in turn be used to gain administrative access on the remote host or to obtain the MD5 hash of the password of any user. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family phpBB viewtopic.php topic_id Parameter SQL Injection 11767 CGI abuses Description: There is a flaw in the version of phpBB hosted on the remote web server that may allow anyone to inject arbitrary SQL commands, which could in turn be used to gain administrative access on the remote host or to obtain the MD5 hash of the password of any user. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 11139 Plugin Name Family CGI Generic SQL Injection CGI abuses Description: By providing specially crafted parameters to CGIs, Nessus was able to get an error from the underlying database. This error suggests that the CGI is affected by a SQL injection vulnerability. An attacker may exploit this flaw to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6995 Plugin Name Family PHP < 5.3.11 Multiple Vulnerabilities Web Servers Description: PHP versions earlier than 5.3.11 are affected by the following vulnerabilities : - During the import of environment variables, temporary changes to the 'magic_quotes_gpc' directive are not handled properly. This can lower the difficulty for SQL injection attacks. (CVE-2012-0831) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 68 - The '$_FILES' variable can be corrupted because the names of uploaded files are not properly validated. (CVE-2012-1172) - The 'open_basedir' directive is not properly handled by the functions 'readline_write_history' and 'readline_read_history'. - The 'header()' function does not detect multi-line headers with a CR. (Bug #60227 / CVE-2011-1398) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache Tomcat 6.0.x < 6.0.35 Multiple Vulnerabilities 6332 Web Servers Severity Total High 1 Description: Versions of Apache Tomcat 6.0.35 are potentially affected by multiple vulnerabilities : - Specially crafted requests are incorrectly processed by Tomcat and can cause the server to allow injection of arbitrary AJP messages. This can lead to authentication bypass and disclosure of sensitive information. Note this vulnerability only occurs when the following are true (CVE-2011-3190): - the org.apache.jk.server.JkCoyoteHandler AJP connector is not used. - POST requests are accepted. - Large numbers of crafted form parameters can cause excessive CPU consumption due to hash collisions. (CVE-2011-4858, CVE-2012-0022) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6263 Plugin Name Family PHP < 5.3.9 Multiple Vulnerabilities Web Servers Severity Total High 1 Description: Versions of PHP earlier than 5.3.9 are potentially affected by multiple vulnerabilities : - It is possible to create a denial of service condition by sending multiple, specially crafted requests containing parameter values that cause hash collisions when computing the hash values for storage in a hash table. (CVE-2011-4885) - An integer overflow exists in the exif_process_IFD_TAG function in exif.c that can allow a remote attacker to read arbitrary memory locations or cause a denial of service condition. This vulnerability only affects PHP 5.4.0beta2 on 32-bit platforms. (CVE-2011-4566) - Calls to libxslt are not restricted via xsltSetSecurityPrefs(), which could allow an attacker to create or overwrite file, resulting in arbitrary code execution. (CVE-2012-0057) - An error exists in the function 'tidy_diagnose' that can allow an attacker to cause the application to dereference a null pointer. This causes the application to crash. (CVE-2012-0781) - The 'PDORow' implementation contains an error that can cause application crashes when interacting with the session feature. C(VE-2012-0788) - An error exists in the timezone handling such that repeated calls to the function 'strtotime' can allow a denial of service attack via memory consuption. (CVE-2012-0789) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6129 Plugin Name Family OpenSSL 0.9.8 < 0.9.8s / 1.x < 1.0.0f Multiple Vulnerabilities Web Servers Severity Total High 1 Description: Versions of OpenSSL 0.9.8 earlier than 0.9.8s, and 1.0.0 earlier than 1.0.0f are potentially affected by the following vulnerabilities : - An extension of the Vaudenay padding oracle attack exists against CBC mode encryption which enables an efficient plaintext recovery attack against the OpenSSL implementation of DTLS. (CVE-2011-4108) - If x509_V_FLAG_POLICY_CHECK is set in OpenSSL 0.9.8, then a policy check failure can lead to a double-free. (CVE-2011-4109) - OpenSSL fails to clear the bytes used as block cipher padding in SSL 3.0 records. As a result, in each record, up to 15 bytes of uninitialized memory may be sent, encrypted, to the SSL peer. (CVE-2011-4576) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 69 - RFC 3779 data can be included in certificates, and if it is malformed, may trigger an assertion failure. This could be used in a denial-of-service attack. (CVE-2011-4577) - Support for handshake restarts for server gated cryptography (SGC) can be used in a denial-of-service attack. (CVE-2011-4619) - A malicious TLS client can send an invalid set of GOST parameters which will cause the server to crash due to a lack of error checking. (CVE-2012-0027) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Apache 2.2 < 2.2.20 Multiple Vulnerabilitie Web Servers s 6021 Severity Total High 1 Description: Versions of Apache 2.2 earlier than 2.2.20 are potentially affected by a denial of service vulnerability. Making a series of HTTP requests with overlapping ranges in the Range or Request-Range request headers can result in memory and CPU exhaustion. A remote, unauthenticated attacker could exploit this flaw to make the system unresponsive. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family PHP 5.3.7 crypt() MD5 Incorrect Return Value 6017 Web Servers Severity Total High 1 Description: PHP version 5.3.7 contains a bug in the crypt() function when generating salted MD5 hashes. The function only returns the salt rather than the salt and hash. Any authentication mechanism that uses crypt() could authorize all authentication attempts due to this bug. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6015 Plugin Name Family PHP 5.3 < 5.3.7 Multiple Vulnerabilities Web Servers Severity Total High 1 Severity Total High 1 Description: Versions of PHP 5.3 earlier than 5.3.7 are potentially affected by multiple vulnerabilities : - A stack buffer overflow exists in socket_connect(). (CVE-2011-1938) - A use-after-free vulnerability exists in substr_replace(). (CVE-2011-1148) - A code execution vulnerability exists in ZipArchive: : addGlob(). (CVE-2011-1657) - crypt_blowfish was updated to 1.2. (CVE-2011-2483) - Multiple null pointer dereferences exist. - An unspecified crash exists in error_log(). - A buffer overflow vulnerability exists in crypt(). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 5824 Plugin Name Family PHP 5.3 < 5.3.6 String To Double Convers Web Servers ion DoS Description: Versions of PHP 5.3 earlier than 5.3.6 are potentially affected by multiple vulnerabilities : - An error exists in the function '_zip_name_locate()' in the file 'ext/zip/lib/zip_name_locate.c' which allows a NULL pointer to be dereferenced when processing an empty archive. (CVE-2011-0421) - A variable casting error exists in the Exif extension's C function 'exif_process_IFD_TAG()' in the file 'ext/exif/exif.c' could allow arbitrary code execution. (CVE-2011-0708) CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 70 - An integer overflow vulnerability exists in the implementation of the PHP function 'shmop_read' in the file 'ext/shmop/shmop.c'. (CVE-2011-1092) - An error exists in the file 'phar/phar_object.c' n which calls to 'zend_throw_exception_ex()' pass data as a string format parameter which could lead to information disclosure or memory corruption when handling PHP archives. (CVE-2011-1153) - A buffer overflow error exists in the C function 'xbuf_format_converter' in the file 'main/snprintf.c' when the PHP configuration setting for 'precision' is set to a large value. (Bug 54055) - An unspecified error exists in the security enforcement regarding the parsing of the fastcgi protocol with the 'FastCGI Process Manager' (FPM) SAPI. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 7.0 to 7.9 Qualitative Risk Analysis with CVSS Scores 71 CVSS 8.0 to 8.9 The Top 15 Host with CVSS 8.0 to 8.9 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 8.0 to 8.9. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 8.0 to 8.9 Vulnerabilities IP Address 10.31.112.10 DNS Name ubuntu OS CPE cpe:/o:canonical:ubuntu_ linux:11.04 Score 90 Vulns 9 The Top 10 Subnets CVSS 8.0 to 8.9 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 8.0 to 8.9 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 8.0 to 8.9; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 8.0 to 8.9 Vulnerabilities CVSS 8.0 to 8.9 Qualitative Risk Analysis with CVSS Scores 72 The Top 10 Plugin Families Detecting CVSS 8.0 to 8.9 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 8.0 to 8.9 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 8.0 to 8.9 Vulnerabilities CVSS 8.0 to 8.9 Qualitative Risk Analysis with CVSS Scores 73 The Details for CVSS 8.0 to 8.9 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 8.0 to 8.9 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories. Details for CVSS 8.0 to 8.9 Vulnerabilities with Affected Hosts Plugin 59386 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : bind9 vulnerabilities (USN- Ubuntu Local Security Checks 1462-1) Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: Dan Luther discovered that Bind incorrectly handled zero length rdata fields. A remote attacker could use this flaw to cause Bind to crash or behave erratically, resulting in a denial of service. (CVE-2012-1667) It was discovered that Bind incorrectly handled revoked domain names. A remote attacker could use this flaw to cause malicious domain names to be continuously resolvable even after they have been revoked. (CVE-2012-1033). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58325 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : mysql-5.1, mysql-dfsg-5.0, Ubuntu Local Security Checks mysql-dfsg-5.1 vulnerabilities (USN-1397-1) Description: Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.95. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Please see the following for more information : http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.ht ml. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56555 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : xorg-server vulnerabilities (USN-1232-1) Ubuntu Local Security Checks Description: It was discovered that the X server incorrectly handled certain malformed input. An authorized attacker could exploit this to cause the X server to crash, leading to a denial or service, or possibly execute arbitrary code with root privileges. This issue only affected Ubuntu 10.04 LTS and 10.10. (CVE-2010-4818) CVSS 8.0 to 8.9 Qualitative Risk Analysis with CVSS Scores 74 It was discovered that the X server incorrectly handled certain malformed input. An authorized attacker could exploit this to cause the X server to crash, leading to a denial or service, or possibly read arbitrary data from the X server process. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-4819) Vladz discovered that the X server incorrectly handled lock files. A local attacker could use this flaw to determine if a file existed or not. (CVE-2011-4028) Vladz discovered that the X server incorrectly handled setting lock file permissions. A local attacker could use this flaw to gain read permissions on arbitrary files and view sensitive information. (CVE-2011-4029). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution 6993 Web Servers Severity Total High 1 Description: PHP versions earlier than 5.3.12 / 5.4.2 are affected by the following vulnerabilities. An error in the file 'sapi/cgi/cgi_main.c' can allow a remote attacker to obtain PHP source code from the web server or to potentially execute arbitrary code. In vulnerable configurations, PHP treats certain query string parameters as command line arguments including switches such as '-s', '-d', and '-c'. Note that this vulnerability is exploitable only when PHP is used in CGI-based configurations. Apache with 'mod_php' is not an exploitable configuration. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6495 Plugin Name Family PHP 5.4.x < 5.4.3 Multiple Vulnerabilities Web Servers Severity Total High 1 Description: PHP versions earlier than 5.4.3 are affected by the following vulnerabilities. - The fix for CVE-2012-1823 does not completely correct the CGI query parameter vulnerability. Disclosure of PHP source code and code execution via query paramenters are still possible. Note that his vulnerability is exploitable only when PHP is used by CGI-based configurations. Apache with 'mod-php' is not an exploitable configuration. (CVE-2012-2311, CVE-2012-2335, CVE-2012-2336) - An unspecified buffer overflow exists related to the function 'apache_request_headers'. (CVE-2012-2329) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6494 Plugin Name Family PHP 5.3.x < 5.3.13 CGI Query String Code Execution Web Servers Severity Total High 1 Description: PHP versions earlier than 5.3.13 are affected by a code execution vulnerability. The fix for CVE-2012-1823 does not completely correct the CGI query vulnerability. Disclosure of PHP source code and code execution via query paramenters are still possible. Note that his vulnerability is exploitable only when PHP is used by CGI-based configurations. Apache with 'mod-php' is not an exploitable configuration. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 8.0 to 8.9 Qualitative Risk Analysis with CVSS Scores 75 CVSS 9.0 to 9.9 The Top 15 Host with CVSS 9.0 to 9.9 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 9.0 to 9.9. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 9.0 to 9.9 Vulnerabilities IP Address DNS Name OS CPE 10.31.112.10 ubuntu cpe:/o:canonical:ubuntu_ linux:11.04 10.31.113.32 openldap cpe:/o:debian:debian_ linux:7.2 Score Vulns 80 8 30 3 The Top 10 Subnets CVSS 9.0 to 9.9 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 9.0 to 9.9 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 9.0 to 9.9; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 9.0 to 9.9 Vulnerabilities CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 76 The Top 10 Plugin Families Detecting CVSS 9.0 to 9.9 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 9.0 to 9.9 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 9.0 to 9.9 Vulnerabilities CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 77 The Details for CVSS 9.0 to 9.9 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 9.0 to 9.9 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories. Details for CVSS 9.0 to 9.9 Vulnerabilities with Affected Hosts Plugin 72881 Plugin Name Family PHP 5.4.x < 5.4.26 Multiple Vulnerabilities CGI abuses Severity Total High 1 Severity Total High 1 Severity Total High 1 Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.26. It is, therefore, potentially affected by the following vulnerabilities : - An error exists related to the Fileinfo extension and the bundled libmagic library that could allow denial of service attacks. (CVE-2014-1943) - An error exists related to the Fileinfo extension and the process of analyzing Portable Executable (PE) format files that could allow denial of service attacks or possibly arbitrary code execution. (CVE-2014-2270) Note that this plugin does not attempt to exploit the vulnerabilities, but instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 69401 Plugin Name Family PHP 5.4.x < 5.4.18 Multiple Vulnerabilities CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.18. It is, therefore, potentially affected by the following vulnerabilities : - A heap corruption error exists in numerous functions in the file 'ext/xml/xml.c'. (CVE-2013-4113 / Bug #65236) - An error exists related to certificate validation, the 'subjectAltName' field and certificates containing NULL bytes. This error can allow spoofing attacks. (CVE-2013-4248) Note that this plugin does not attempt to exploit these vulnerabilities, but instead relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 67260 Plugin Name Family PHP 5.4.x < 5.4.17 Buffer Overflow CGI abuses Description: According to its banner, the version of PHP 5.4.x installed on the remote host is a version prior to 5.4.17. It is, therefore, potentially affected by a buffer overflow error that exists in the function '_pdo_pgsql_error' in the file 'ext/pdo_pgsql/pgsql_driver.c'. CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 78 Note that this plugin does not attempt to exploit this vulnerability, but instead, relies only on PHP's self-reported version number. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 : qt4-x11 vulnera bilities (USN-1504-1) 59957 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Description: It was discovered that Qt did not properly handle wildcard domain names or IP addresses in the Common Name field of X.509 certificates. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. This issue only affected Ubuntu 10.04 LTS. (CVE-2010-5076) A heap-based buffer overflow was discovered in the HarfBuzz module. If a user were tricked into opening a crafted font file in a Qt application, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-3193) It was discovered that Qt did not properly handle greyscale TIFF images. If a Qt application could be made to process a crafted TIFF file, an attacker could cause a denial of service. (CVE-2011-3194). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58964 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : imagemagick vulnerabilities (USN1435-1) Ubuntu Local Security Checks Description: Joonas Kuorilehto and Aleksis Kauppinen discovered that ImageMagick incorrectly handled certain ResolutionUnit tags. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program. (CVE-2012-0247, CVE-2012-1185) Joonas Kuorilehto and Aleksis Kauppinen discovered that ImageMagick incorrectly handled certain IFD structures. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. (CVE-2012-0248, CVE-2012-1186) Aleksis Kauppinen, Joonas Kuorilehto and Tuomas Parttimaa discovered that ImageMagick incorrectly handled certain JPEG EXIF tags. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. (CVE-2012-0259) It was discovered that ImageMagick incorrectly handled certain JPEG EXIF tags. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program. (CVE-2012-1610) Aleksis Kauppinen, Joonas Kuorilehto and Tuomas Parttimaa discovered that ImageMagick incorrectly handled certain TIFF EXIF tags. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service or possibly execute code with the privileges of the user invoking the program. (CVE-2012-1798). CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 79 Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58807 Plugin Name Family Ubuntu 11.04 : gsettings-desktop-schemas Ubuntu Local Security Checks regression (USN-1400-5) Severity Total High 1 Description: USN-1400-1 fixed vulnerabilities in Firefox. Firefox 11 started using GSettings to access the system proxy settings. If there is a GSettings proxy settings schema, Firefox will consume it. The GSettings proxy settings schema that was shipped by default was unused by other applications and broke Firefox's ability to use system proxy settings. This update removes the unused schema. We apologize for the inconvenience. Soroush Dalili discovered that Firefox did not adequately protect against dropping JavaScript links onto a frame. A remote attacker could, through cross-site scripting (XSS), exploit this to modify the contents or steal confidential data. (CVE-2012-0455) Atte Kettunen discovered a use-after-free vulnerability in Firefox's handling of SVG animations. An attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2012-0457) Atte Kettunen discovered an out of bounds read vulnerability in Firefox's handling of SVG Filters. An attacker could potentially exploit this to make data from the user's memory accessible to the page content. (CVE-2012-0456) Mike Brooks discovered that using carriage return line feed (CRLF) injection, one could introduce a new Content Security Policy (CSP) rule which allows for cross-site scripting (XSS) on sites with a separate header injection vulnerability. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0451) Mariusz Mlynski discovered that the Home button accepted JavaScript links to set the browser Home page. An attacker could use this vulnerability to get the script URL loaded in the privileged about:sessionrestore context. (CVE-2012-0458) Daniel Glazman discovered that the Cascading Style Sheets (CSS) implementation is vulnerable to crashing due to modification of a keyframe followed by access to the cssText of the keyframe. If the user were tricked into opening a specially crafted web page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0459) Matt Brubeck discovered that Firefox did not properly restrict access to the window.fullScreen object. If the user were tricked into opening a specially crafted web page, an attacker could potentially use this vulnerability to spoof the user interface. (CVE-2012-0460) Bob Clary, Christian Holler, Jesse Ruderman, Michael Bebenita, David Anderson, Jeff Walden, Vincenzo Iozzo, and Willem Pinckaers discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 80 execute code with the privileges of the user invoking Firefox. (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58384 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : ubufox update (USN-1400-2) Ubuntu Local Security Checks Severity Total High 1 Description: USN-1400-1 fixed vulnerabilities in Firefox. This update provides an updated ubufox package for use with the latest Firefox. Soroush Dalili discovered that Firefox did not adequately protect against dropping JavaScript links onto a frame. A remote attacker could, through cross-site scripting (XSS), exploit this to modify the contents or steal confidential data. (CVE-2012-0455) Atte Kettunen discovered a use-after-free vulnerability in Firefox's handling of SVG animations. An attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2012-0457) Atte Kettunen discovered an out of bounds read vulnerability in Firefox's handling of SVG Filters. An attacker could potentially exploit this to make data from the user's memory accessible to the page content. (CVE-2012-0456) Mike Brooks discovered that using carriage return line feed (CRLF) injection, one could introduce a new Content Security Policy (CSP) rule which allows for cross-site scripting (XSS) on sites with a separate header injection vulnerability. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0451) Mariusz Mlynski discovered that the Home button accepted JavaScript links to set the browser Home page. An attacker could use this vulnerability to get the script URL loaded in the privileged about:sessionrestore context. (CVE-2012-0458) Daniel Glazman discovered that the Cascading Style Sheets (CSS) implementation is vulnerable to crashing due to modification of a keyframe followed by access to the cssText of the keyframe. If the user were tricked into opening a specially crafted web page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0459) Matt Brubeck discovered that Firefox did not properly restrict access to the window.fullScreen object. If the user were tricked into opening a specially crafted web page, an attacker could potentially use this vulnerability to spoof the user interface. (CVE-2012-0460) Bob Clary, Christian Holler, Jesse Ruderman, Michael Bebenita, David Anderson, Jeff Walden, Vincenzo Iozzo, and Willem Pinckaers discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464). CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 81 Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerabilities (USN-1400-1) 58383 Ubuntu Local Security Checks Severity Total High 1 Severity Total High 1 Description: Soroush Dalili discovered that Firefox did not adequately protect against dropping JavaScript links onto a frame. A remote attacker could, through cross-site scripting (XSS), exploit this to modify the contents or steal confidential data. (CVE-2012-0455) Atte Kettunen discovered a use-after-free vulnerability in Firefox's handling of SVG animations. An attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2012-0457) Atte Kettunen discovered an out of bounds read vulnerability in Firefox's handling of SVG Filters. An attacker could potentially exploit this to make data from the user's memory accessible to the page content. (CVE-2012-0456) Mike Brooks discovered that using carriage return line feed (CRLF) injection, one could introduce a new Content Security Policy (CSP) rule which allows for cross-site scripting (XSS) on sites with a separate header injection vulnerability. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0451) Mariusz Mlynski discovered that the Home button accepted JavaScript links to set the browser Home page. An attacker could use this vulnerability to get the script URL loaded in the privileged about:sessionrestore context. (CVE-2012-0458) Daniel Glazman discovered that the Cascading Style Sheets (CSS) implementation is vulnerable to crashing due to modification of a keyframe followed by access to the cssText of the keyframe. If the user were tricked into opening a specially crafted web page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0459) Matt Brubeck discovered that Firefox did not properly restrict access to the window.fullScreen object. If the user were tricked into opening a specially crafted web page, an attacker could potentially use this vulnerability to spoof the user interface. (CVE-2012-0460) Bob Clary, Christian Holler, Jesse Ruderman, Michael Bebenita, David Anderson, Jeff Walden, Vincenzo Iozzo, and Willem Pinckaers discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57887 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : openssl vulnerabilities (USN1357-1) Ubuntu Local Security Checks CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 82 Description: It was discovered that the elliptic curve cryptography (ECC) subsystem in OpenSSL, when using the Elliptic Curve Digital Signature Algorithm (ECDSA) for the ECDHE_ECDSA cipher suite, did not properly implement curves over binary fields. This could allow an attacker to determine private keys via a timing attack. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-1945) Adam Langley discovered that the ephemeral Elliptic Curve Diffie-Hellman (ECDH) functionality in OpenSSL did not ensure thread safety while processing handshake messages from clients. This could allow a remote attacker to cause a denial of service via out-of-order messages that violate the TLS protocol. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-3210) Nadhem Alfardan and Kenny Paterson discovered that the Datagram Transport Layer Security (DTLS) implementation in OpenSSL performed a MAC check only if certain padding is valid. This could allow a remote attacker to recover plaintext. (CVE-2011-4108) Antonio Martin discovered that a flaw existed in the fix to address CVE-2011-4108, the DTLS MAC check failure. This could allow a remote attacker to cause a denial of service. (CVE-2012-0050) Ben Laurie discovered a double free vulnerability in OpenSSL that could be triggered when the X509_V_FLAG_POLICY_CHECK flag is enabled. This could allow a remote attacker to cause a denial of service. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS, Ubuntu 10.10 and Ubuntu 11.04. (CVE-2011-4109) It was discovered that OpenSSL, in certain circumstances involving ECDH or ECDHE cipher suites, used an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves. This could allow a remote attacker to obtain the private key of a TLS server via multiple handshake attempts. This issue only affected Ubuntu 8.04 LTS. (CVE-2011-4354) Adam Langley discovered that the SSL 3.0 implementation in OpenSSL did not properly initialize data structures for block cipher padding. This could allow a remote attacker to obtain sensitive information. (CVE-2011-4576) Andrew Chi discovered that OpenSSL, when RFC 3779 support is enabled, could trigger an assert when handling an X.509 certificate containing certificate-extension data associated with IP address blocks or Autonomous System (AS) identifiers. This could allow a remote attacker to cause a denial of service. (CVE-2011-4577) Adam Langley discovered that the Server Gated Cryptography (SGC) implementation in OpenSSL did not properly handle handshake restarts. This could allow a remote attacker to cause a denial of service. (CVE-2011-4619) Andrey Kulikov discovered that the GOST block cipher engine in OpenSSL did not properly handle invalid parameters. This could allow a remote attacker to cause a denial of service via crafted data from a TLS client. This issue only affected Ubuntu 11.10. (CVE-2012-0027). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57615 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : libxml2 vulnerabilities (USN1334-1) Ubuntu Local Security Checks Severity Total High 1 CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 83 Description: It was discovered that libxml2 contained an off by one error. If a user or application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause the application to crash or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-0216) It was discovered that libxml2 is vulnerable to double-free conditions when parsing certain XML documents. This could allow a remote attacker to cause a denial of service. (CVE-2011-2821, CVE-2011-2834) It was discovered that libxml2 did not properly detect end of file when parsing certain XML documents. An attacker could exploit this to crash applications linked against libxml2. (CVE-2011-3905) It was discovered that libxml2 did not properly decode entity references with long names. If a user or application linked against libxml2 were tricked into opening a specially crafted XML file, an attacker could cause the application to crash or possibly execute arbitrary code with the privileges of the user invoking the program. (CVE-2011-3919). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56870 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : freetype vulnerabilities (USN1267-1) Ubuntu Local Security Checks Severity Total High 1 Description: It was discovered that FreeType did not correctly handle certain malformed Type 1 font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. (CVE-2011-3256) It was discovered that FreeType did not correctly handle certain malformed CID-keyed PostScript font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. (CVE-2011-3439). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 9.0 to 9.9 Qualitative Risk Analysis with CVSS Scores 84 CVSS 10.0 to 10.0 The Top 15 Host with CVSS 10.0 Vulnerabilities table provides cumulative top 15 hosts with a CVSS score of 10.0. Each IP address will have their Hostname (DNS), OS (OS CPE), the total vulnerabilities (Total), and a vulnerabilities bar. The vulnerably bar will separate display each severity by color. The different colors are orange for medium, red for high, and purple for critical. Top 15 Hosts with CVSS 10.0 Vulnerabilities IP Address DNS Name OS CPE 10.31.112.10 ubuntu cpe:/o:canonical:ubuntu_ linux:11.04 10.31.113.32 openldap cpe:/o:debian:debian_ linux:7.2 Score 1180 40 Vulns 28 6 1 The Top 10 Subnets CVSS 10.0 Vulnerabilities chart provides the cumulative top ten network subnets with a CVSS score of 10.0 by vulnerabilities. Each bar represents the total vulnerability count for each subnet. The chart is filtered using the Class C summary tool and CVSS Score of 10.0; the data is then sorted using the total vulnerability field. Top 10 Subnets with CVSS 10.0 Vulnerabilities CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 85 The Top 10 Plugin Families Detecting CVSS 10.0 Vulnerabilities chart provides a cumulative view of the top 10 CVSS 10.0 vulnerabilities by plugin family. This pie chart is sorted and displayed by total number of vulnerabilities. Plugin families are designed to allow an efficient and accurate grouping of similar security checks, aka plugins. Grouping plugins into families allows the vulnerability administrator to quickly enable or disable a large group of plugins that are relevant to the target being scanned or unnecessary for a given host. Top 10 Plugin Families Detecting CVSS 10.0 Vulnerabilities CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 86 The Details for CVSS 10.0 Vulnerabilities with Affected Hosts table provides a detailed list of vulnerabilities along with the affected host. The vulnerabilities filter by CVSS Score of 10.0 and sorts by totals vulnerabilities. This table will show each IP Address and provides information in regards to plugin, plugin name, plugin family, the severity, and total number of vulnerabilities. This table provides a description of the vulnerability and separates the IP address into their respected repositories. Details for CVSS 10.0 Vulnerabilities with Affected Hosts Plugin 62709 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS / 12.10 : openjdk-6, openjdk-7 vulnera bilities (USN-1619-1) Ubuntu Local Security Checks Severity Total Critical 1 Severity Total Critical 1 Description: Several information disclosure vulnerabilities were discovered in the OpenJDK JRE. (CVE-2012-3216, CVE-2012-5069, CVE-2012-5072, CVE-2012-5075, CVE-2012-5077, CVE-2012-5085) Vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. (CVE-2012-4416, CVE-2012-5071) Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. (CVE-2012-1531, CVE-2012-1532, CVE-2012-1533, CVE-2012-3143, CVE-2012-3159, CVE-2012-5068, CVE-2012-5083, CVE-2012-5084, CVE-2012-5086, CVE-2012-5089) Information disclosure vulnerabilities were discovered in the OpenJDK JRE. These issues only affected Ubuntu 12.10. (CVE-2012-5067, CVE-2012-5070) Vulnerabilities were discovered in the OpenJDK JRE related to data integrity. (CVE-2012-5073, CVE-2012-5079) A vulnerability was discovered in the OpenJDK JRE related to information disclosure and data integrity. This issue only affected Ubuntu 12.10. (CVE-2012-5074) Several vulnerabilities were discovered in the OpenJDK JRE related to information disclosure and data integrity. An attacker could exploit these to cause a denial of service. These issues only affected Ubuntu 12.10. (CVE-2012-5076, CVE-2012-5087, CVE-2012-5088) A denial of service vulnerability was found in OpenJDK. (CVE-2012-5081) Please see the following for more information: http://www.oracle.com/technetwork/topics/security/javacpuoct2012-15159 24.html. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 62515 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox vulnerabilities (USN-1608-1) Ubuntu Local Security Checks Description: It was discovered that the browser engine used in Firefox contained a memory corruption flaw. If a user were tricked into opening a specially crafted web page, a remote attacker could cause Firefox to crash or potentially execute arbitrary code as the user invoking the program. (CVE-2012-4191) CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 87 It was discovered that Firefox allowed improper access to the Location object. An attacker could exploit this to obtain sensitive information. (CVE-2012-4192). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox vulnerabilities (USN-1600-1) 62476 Ubuntu Local Security Checks Severity Total Critical 1 Severity Total Critical 1 Description: Henrik Skupin, Jesse Ruderman, Christian Holler, Soroush Dalili and others discovered several memory corruption flaws in Firefox. If a user were tricked into opening a specially crafted web page, a remote attacker could cause Firefox to crash or potentially execute arbitrary code as the user invoking the program. (CVE-2012-3982, CVE-2012-3983, CVE-2012-3988, CVE-2012-3989) David Bloom and Jordi Chancel discovered that Firefox did not always properly handle the <select> element. A remote attacker could exploit this to conduct URL spoofing and clickjacking attacks. (CVE-2012-3984) Collin Jackson discovered that Firefox did not properly follow the HTML5 specification for document.domain behavior. A remote attacker could exploit this to conduct cross-site scripting (XSS) attacks via JavaScript execution. (CVE-2012-3985) Johnny Stenback discovered that Firefox did not properly perform security checks on test methods for DOMWindowUtils. (CVE-2012-3986) Alice White discovered that the security checks for GetProperty could be bypassed when using JSAPI. If a user were tricked into opening a specially crafted web page, a remote attacker could exploit this to execute arbitrary code as the user invoking the program. (CVE-2012-3991) Mariusz Mlynski discovered a history state error in Firefox. A remote attacker could exploit this to spoof the location property to inject script or intercept posted data. (CVE-2012-3992) Mariusz Mlynski and others discovered several flaws in Firefox that allowed a remote attacker to conduct cross-site scripting (XSS) attacks. (CVE-2012-3993, CVE-2012-3994, CVE-2012-4184) Abhishek Arya, Atte Kettunen and others discovered several memory flaws in Firefox when using the Address Sanitizer tool. If a user were tricked into opening a specially crafted web page, a remote attacker could cause Firefox to crash or potentially execute arbitrary code as the user invoking the program. (CVE-2012-3990, CVE-2012-3995, CVE-2012-4179, CVE-2012-4180, CVE-2012-4181, CVE-2012-4182, CVE-2012-4183, CVE-2012-4185, CVE-2012-4186, CVE-2012-4187, CVE-2012-4188). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 62178 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11. 10 / 12.04 LTS : php5 vulnerabilities (USN1569-1) Ubuntu Local Security Checks Description: It was discovered that PHP incorrectly handled certain character sequences when applying HTTP response-splitting protection. A remote attacker could create a specially-crafted URL and inject arbitrary headers. (CVE-2011-1398, CVE-2012-4388) CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 88 It was discovered that PHP incorrectly handled directories with a large number of files. This could allow a remote attacker to execute arbitrary code with the privileges of the web server, or to perform a denial of service. (CVE-2012-2688) It was discovered that PHP incorrectly parsed certain PDO prepared statements. A remote attacker could use this flaw to cause PHP to crash, leading to a denial of service. (CVE-2012-3450). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 62062 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox regression (USN-1548-2) Ubuntu Local Security Checks Severity Total Critical 1 Description: USN-1548-1 fixed vulnerabilities in Firefox. The new package caused a regression in Private Browsing which could leak sites visited to the browser cache. This update fixes the problem. Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew Sutherland, Jason Smith, John Schoenick, Vladimir Vukicevic and Daniel Holbert discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1970, CVE-2012-1971) Abhishek Arya discovered multiple use-after-free vulnerabilities. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964) Mariusz Mlynsk discovered that it is possible to shadow the location object using Object.defineProperty. This could potentially result in a cross-site scripting (XSS) attack against plugins. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents or steal confidential data within the same domain. (CVE-2012-1956) Mariusz Mlynski discovered an escalation of privilege vulnerability through about:newtab. This could possibly lead to potentially code execution with the privileges of the user invoking Firefox. (CVE-2012-3965) Frédéric Hoguin discovered that bitmap format images with a negative height could potentially result in memory corruption. If the user were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3966) It was discovered that Firefox's WebGL implementation was vulnerable to multiple memory safety issues. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 89 privileges of the user invoking Firefox. (CVE-2012-3967, CVE-2012-3968) Arthur Gerkis discovered multiple memory safety issues in Firefox's Scalable Vector Graphics (SVG) implementation. If the user were tricked into opening a specially crafted image, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3969, CVE-2012-3970) Christoph Diehl discovered multiple memory safety issues in the bundled Graphite 2 library. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3971) Nicolas Grégoire discovered an out-of-bounds read in the format-number feature of XSLT. This could potentially cause inaccurate formatting of numbers and information leakage. (CVE-2012-3972) Mark Goodwin discovered that under certain circumstances, Firefox's developer tools could allow remote debugging even when disabled. (CVE-2012-3973) It was discovered that when the DOMParser is used to parse text/html data in a Firefox extension, linked resources within this HTML data will be loaded. If the data being parsed in the extension is untrusted, it could lead to information leakage and potentially be combined with other attacks to become exploitable. (CVE-2012-3975) Mark Poticha discovered that under certain circumstances incorrect SSL certificate information can be displayed on the addressbar, showing the SSL data for a previous site while another has been loaded. This could potentially be used for phishing attacks. (CVE-2012-3976) It was discovered that, in some instances, certain security checks in the location object could be bypassed. This could allow for the loading of restricted content and can potentially be combined with other issues to become exploitable. (CVE-2012-3978) Colby Russell discovered that eval in the web console can execute injected code with chrome privileges, leading to the running of malicious code in a privileged context. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3980). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 61773 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : openjdk-6 vulnerabilities (USN-1553- Ubuntu Local Security Checks 1) Severity Total Critical 1 Description: It was discovered that the Beans component in OpenJDK 6 did not properly prevent access to restricted classes. A remote attacker could use this to create an untrusted Java applet or application that would bypass Java sandbox restrictions. (CVE-2012-1682) CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 90 It was discovered that functionality in the AWT component in OpenJDK 6 made it easier for a remote attacker, in conjunction with other vulnerabilities, to bypass Java sandbox restrictions. (CVE-2012-0547). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 61730 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox vulnerabilities (USN-1548-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: Gary Kwong, Christian Holler, Jesse Ruderman, Steve Fink, Bob Clary, Andrew Sutherland, Jason Smith, John Schoenick, Vladimir Vukicevic and Daniel Holbert discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1970, CVE-2012-1971) Abhishek Arya discovered multiple use-after-free vulnerabilities. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964) Mariusz Mlynsk discovered that it is possible to shadow the location object using Object.defineProperty. This could potentially result in a cross-site scripting (XSS) attack against plugins. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents or steal confidential data within the same domain. (CVE-2012-1956) Mariusz Mlynski discovered an escalation of privilege vulnerability through about:newtab. This could possibly lead to potentially code execution with the privileges of the user invoking Firefox. (CVE-2012-3965) Frédéric Hoguin discovered that bitmap format images with a negative height could potentially result in memory corruption. If the user were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3966) It was discovered that Firefox's WebGL implementation was vulnerable to multiple memory safety issues. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3967, CVE-2012-3968) Arthur Gerkis discovered multiple memory safety issues in Firefox's Scalable Vector Graphics (SVG) implementation. If the user were tricked into opening a specially crafted image, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3969, CVE-2012-3970) Christoph Diehl discovered multiple memory safety issues in the bundled Graphite 2 library. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 91 denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3971) Nicolas Grégoire discovered an out-of-bounds read in the format-number feature of XSLT. This could potentially cause inaccurate formatting of numbers and information leakage. (CVE-2012-3972) Mark Goodwin discovered that under certain circumstances, Firefox's developer tools could allow remote debugging even when disabled. (CVE-2012-3973) It was discovered that when the DOMParser is used to parse text/html data in a Firefox extension, linked resources within this HTML data will be loaded. If the data being parsed in the extension is untrusted, it could lead to information leakage and potentially be combined with other attacks to become exploitable. (CVE-2012-3975) Mark Poticha discovered that under certain circumstances incorrect SSL certificate information can be displayed on the addressbar, showing the SSL data for a previous site while another has been loaded. This could potentially be used for phishing attacks. (CVE-2012-3976) It was discovered that, in some instances, certain security checks in the location object could be bypassed. This could allow for the loading of restricted content and can potentially be combined with other issues to become exploitable. (CVE-2012-3978) Colby Russell discovered that eval in the web console can execute injected code with chrome privileges, leading to the running of malicious code in a privileged context. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-3980). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 60086 Plugin Name Family PHP 5.4.x < 5.4.5 _php_stream_scandir Overflow CGI abuses Severity Total Critical 1 Severity Total Critical 1 Description: According to its banner, the version of PHP installed on the remote host is 5.4.x earlier than 5.4.5, and is, therefore, potentially affected by an unspecified overflow vulnerability in the function '_php_stream_scandir' in the file 'main/streams/streams.c'. Hosts in Repository 'net_10_31_113': 10.31.113.32 - MAC Address: b6:3c:8a:3d:0e:20 DNS Name: openldap Plugin 60013 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : ubufox update (USN-1509-2) Ubuntu Local Security Checks Description: USN-1509-1 fixed vulnerabilities in Firefox. This update provides an updated ubufox package for use with the lastest Firefox. Benoit Jacob, Jesse Ruderman, Christian Holler, Bill McCloskey, Brian Smith, Gary Kwong, Christoph Diehl, Chris Jones, Brad Lassey, and Kyle Huey discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1948, CVE-2012-1949) Mario Gomes discovered that the address bar may be CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 92 incorrectly updated. Drag-and-drop events in the address bar may cause the address of the previous site to be displayed while a new page is loaded. An attacker could exploit this to conduct phishing attacks. (CVE-2012-1950) Abhishek Arya discovered four memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1951, CVE-2012-1952, CVE-2012-1953, CVE-2012-1954) Mariusz Mlynski discovered that the address bar may be incorrectly updated. Calls to history.forward and history.back could be used to navigate to a site while the address bar still displayed the previous site. A remote attacker could exploit this to conduct phishing attacks. (CVE-2012-1955) Mario Heiderich discovered that HTML <embed> tags were not filtered out of the HTML <description> of RSS feeds. A remote attacker could exploit this to conduct cross-site scripting (XSS) attacks via JavaScript execution in the HTML feed view. (CVE-2012-1957) Arthur Gerkis discovered a use-after-free vulnerability. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1958) Bobby Holley discovered that same-compartment security wrappers (SCSW) could be bypassed to allow XBL access. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to execute code with the privileges of the user invoking Firefox. (CVE-2012-1959) Tony Payne discovered an out-of-bounds memory read in Mozilla's color management library (QCMS). If the user were tricked into opening a specially crafted color profile, an attacker could possibly exploit this to cause a denial of service via application crash. (CVE-2012-1960) Frédéric Buclin discovered that the X-Frame-Options header was ignored when its value was specified multiple times. An attacker could exploit this to conduct clickjacking attacks. (CVE-2012-1961) Bill Keese discovered a memory corruption vulnerability. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1962) Karthikeyan Bhargavan discovered an information leakage vulnerability in the Content Security Policy (CSP) 1.0 implementation. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to access a user's OAuth 2.0 access tokens and OpenID credentials. (CVE-2012-1963) Matt McCutchen discovered a clickjacking vulnerability in the certificate warning page. A remote attacker could trick a user into accepting a malicious certificate via a crafted CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 93 certificate warning page. (CVE-2012-1964) Mario Gomes and Soroush Dalili discovered that JavaScript was not filtered out of feed URLs. If the user were tricked into opening a specially crafted URL, an attacker could possibly exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2012-1965) A vulnerability was discovered in the context menu of data: URLs. If the user were tricked into opening a specially crafted URL, an attacker could possibly exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2012-1966) It was discovered that the execution of javascript: URLs was not properly handled in some cases. A remote attacker could exploit this to execute code with the privileges of the user invoking Firefox. (CVE-2012-1967). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 60012 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox vulnerabilities (USN-1509-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: Benoit Jacob, Jesse Ruderman, Christian Holler, Bill McCloskey, Brian Smith, Gary Kwong, Christoph Diehl, Chris Jones, Brad Lassey, and Kyle Huey discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1948, CVE-2012-1949) Mario Gomes discovered that the address bar may be incorrectly updated. Drag-and-drop events in the address bar may cause the address of the previous site to be displayed while a new page is loaded. An attacker could exploit this to conduct phishing attacks. (CVE-2012-1950) Abhishek Arya discovered four memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1951, CVE-2012-1952, CVE-2012-1953, CVE-2012-1954) Mariusz Mlynski discovered that the address bar may be incorrectly updated. Calls to history.forward and history.back could be used to navigate to a site while the address bar still displayed the previous site. A remote attacker could exploit this to conduct phishing attacks. (CVE-2012-1955) Mario Heiderich discovered that HTML <embed> tags were not filtered out of the HTML <description> of RSS feeds. A remote attacker could exploit this to conduct cross-site scripting (XSS) attacks via JavaScript execution in the HTML feed view. (CVE-2012-1957) Arthur Gerkis discovered a use-after-free vulnerability. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1958) Bobby Holley discovered that same-compartment security wrappers (SCSW) could be bypassed to allow XBL access. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 94 this to execute code with the privileges of the user invoking Firefox. (CVE-2012-1959) Tony Payne discovered an out-of-bounds memory read in Mozilla's color management library (QCMS). If the user were tricked into opening a specially crafted color profile, an attacker could possibly exploit this to cause a denial of service via application crash. (CVE-2012-1960) Frédéric Buclin discovered that the X-Frame-Options header was ignored when its value was specified multiple times. An attacker could exploit this to conduct clickjacking attacks. (CVE-2012-1961) Bill Keese discovered a memory corruption vulnerability. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1962) Karthikeyan Bhargavan discovered an information leakage vulnerability in the Content Security Policy (CSP) 1.0 implementation. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to access a user's OAuth 2.0 access tokens and OpenID credentials. (CVE-2012-1963) Matt McCutchen discovered a clickjacking vulnerability in the certificate warning page. A remote attacker could trick a user into accepting a malicious certificate via a crafted certificate warning page. (CVE-2012-1964) Mario Gomes and Soroush Dalili discovered that JavaScript was not filtered out of feed URLs. If the user were tricked into opening a specially crafted URL, an attacker could possibly exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2012-1965) A vulnerability was discovered in the context menu of data: URLs. If the user were tricked into opening a specially crafted URL, an attacker could possibly exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2012-1966) It was discovered that the execution of javascript: URLs was not properly handled in some cases. A remote attacker could exploit this to execute code with the privileges of the user invoking Firefox. (CVE-2012-1967). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59640 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox regressions (USN-1463-3) Ubuntu Local Security Checks Severity Total Critical 1 Description: USN-1463-1 fixed vulnerabilities in Firefox. The new package caused a regression in the rendering of Hebrew text and the ability of the Hotmail inbox to auto-update. This update fixes the problem. Jesse Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew McCreight, Olli Pettay, Boris Zbarsky, and Brian Bondy discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1937, CVE-2012-1938) It was discovered that Mozilla's WebGL implementation exposed a bug in certain NVIDIA graphics drivers. The impact CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 95 of this issue has not been disclosed at this time. (CVE-2011-3101) Adam Barth discovered that certain inline event handlers were not being blocked properly by the Content Security Policy's (CSP) inline-script blocking feature. Web applications relying on this feature of CSP to protect against cross-site scripting (XSS) were not fully protected. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-1944) Paul Stone discovered that a viewed HTML page hosted on a Windows or Samba share could load Windows shortcut files (.lnk) in the same share. These shortcut files could then link to arbitrary locations on the local file system of the individual loading the HTML page. An attacker could potentially use this vulnerability to show the contents of these linked files or directories in an iframe, resulting in information disclosure. (CVE-2012-1945) Arthur Gerkis discovered a use-after-free vulnerability while replacing/inserting a node in a document. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1946) Kaspar Brand discovered a vulnerability in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash. (CVE-2012-0441) Abhishek Arya discovered two buffer overflow and one use-after-free vulnerabilities. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1940, CVE-2012-1941, CVE-2012-1947). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 59394 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox vulnerabilities (USN-1463-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: Jesse Ruderman, Igor Bukanov, Bill McCloskey, Christian Holler, Andrew McCreight, Olli Pettay, Boris Zbarsky, and Brian Bondy discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1937, CVE-2012-1938) It was discovered that Mozilla's WebGL implementation exposed a bug in certain NVIDIA graphics drivers. The impact of this issue has not been disclosed at this time. (CVE-2011-3101) Adam Barth discovered that certain inline event handlers were not being blocked properly by the Content Security Policy's (CSP) CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 96 inline-script blocking feature. Web applications relying on this feature of CSP to protect against cross-site scripting (XSS) were not fully protected. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-1944) Paul Stone discovered that a viewed HTML page hosted on a Windows or Samba share could load Windows shortcut files (.lnk) in the same share. These shortcut files could then link to arbitrary locations on the local file system of the individual loading the HTML page. An attacker could potentially use this vulnerability to show the contents of these linked files or directories in an iframe, resulting in information disclosure. (CVE-2012-1945) Arthur Gerkis discovered a use-after-free vulnerability while replacing/inserting a node in a document. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1946) Kaspar Brand discovered a vulnerability in how the Network Security Services (NSS) ASN.1 decoder handles zero length items. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit this to cause a denial of service via application crash. (CVE-2012-0441) Abhishek Arya discovered two buffer overflow and one use-after-free vulnerabilities. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-1940, CVE-2012-1941, CVE-2012-1947). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58923 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 : ubufox update (USN-1430-2) Ubuntu Local Security Checks Severity Total Critical 1 Description: USN-1430-1 fixed vulnerabilities in Firefox. This update provides an updated ubufox package for use with the latest Firefox. Bob Clary, Christian Holler, Brian Hackett, Bobby Holley, Gary Kwong, Hilary Hall, Honza Bambas, Jesse Ruderman, Julian Seward, and Olli Pettay discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0467, CVE-2012-0468) Aki Helin discovered a use-after-free vulnerability in XPConnect. An attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2012-0469) Atte Kettunen discovered that invalid frees cause heap corruption in gfxImageSurface. If a user were tricked into opening a malicious Scalable Vector Graphics (SVG) image file, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0470) CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 97 Anne van Kesteren discovered a potential cross-site scripting (XSS) vulnerability via multibyte content processing errors. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0471) Matias Juntunen discovered a vulnerability in Firefox's WebGL implementation that potentially allows the reading of illegal video memory. An attacker could possibly exploit this to cause a denial of service via application crash. (CVE-2012-0473) Jordi Chancel, Eddy Bordi, and Chris McGowen discovered that Firefox allowed the address bar to display a different website than the one the user was visiting. This could potentially leave the user vulnerable to cross-site scripting (XSS) attacks. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0474) Simone Fabiano discovered that Firefox did not always send correct origin headers when connecting to an IPv6 websites. An attacker could potentially use this to bypass intended access controls. (CVE-2012-0475) Masato Kinugawa discovered that cross-site scripting (XSS) injection is possible during the decoding of ISO-2022-KR and ISO-2022-CN character sets. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0477) It was discovered that certain images rendered using WebGL could cause Firefox to crash. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0478) Mateusz Jurczyk discovered an off-by-one error in the OpenType Sanitizer. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2011-3062) Daniel Divricean discovered a defect in the error handling of JavaScript errors can potentially leak the file names and location of JavaScript files on a server. This could potentially lead to inadvertent information disclosure and a vector for further attacks. (CVE-2011-1187) Jeroen van der Gun discovered a vulnerability in the way Firefox handled RSS and Atom feeds. Invalid RSS or ATOM content loaded over HTTPS caused the location bar to be updated with the address of this content, while the main window still displays the previously loaded content. An attacker could potentially exploit this vulnerability to conduct phishing attacks. (CVE-2012-0479). Hosts in Repository 'net_10_31_112': CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 98 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58922 Plugin Name Family Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : firefox vulnerabilities (USN-1430-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: Bob Clary, Christian Holler, Brian Hackett, Bobby Holley, Gary Kwong, Hilary Hall, Honza Bambas, Jesse Ruderman, Julian Seward, and Olli Pettay discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0467, CVE-2012-0468) Aki Helin discovered a use-after-free vulnerability in XPConnect. An attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2012-0469) Atte Kettunen discovered that invalid frees cause heap corruption in gfxImageSurface. If a user were tricked into opening a malicious Scalable Vector Graphics (SVG) image file, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0470) Anne van Kesteren discovered a potential cross-site scripting (XSS) vulnerability via multibyte content processing errors. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0471) Matias Juntunen discovered a vulnerability in Firefox's WebGL implementation that potentially allows the reading of illegal video memory. An attacker could possibly exploit this to cause a denial of service via application crash. (CVE-2012-0473) Jordi Chancel, Eddy Bordi, and Chris McGowen discovered that Firefox allowed the address bar to display a different website than the one the user was visiting. This could potentially leave the user vulnerable to cross-site scripting (XSS) attacks. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0474) Simone Fabiano discovered that Firefox did not always send correct origin headers when connecting to an IPv6 websites. An attacker could potentially use this to bypass intended access controls. (CVE-2012-0475) Masato Kinugawa discovered that cross-site scripting (XSS) injection is possible during the decoding of ISO-2022-KR and ISO-2022-CN character sets. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0477) It was discovered that certain images rendered using WebGL could cause Firefox to crash. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0478) Mateusz Jurczyk discovered an off-by-one error in the OpenType Sanitizer. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 99 application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2011-3062) Daniel Divricean discovered a defect in the error handling of JavaScript errors can potentially leak the file names and location of JavaScript files on a server. This could potentially lead to inadvertent information disclosure and a vector for further attacks. (CVE-2011-1187) Jeroen van der Gun discovered a vulnerability in the way Firefox handled RSS and Atom feeds. Invalid RSS or ATOM content loaded over HTTPS caused the location bar to be updated with the address of this content, while the main window still displays the previously loaded content. An attacker could potentially exploit this vulnerability to conduct phishing attacks. (CVE-2012-0479). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58444 Plugin Name Family Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11. 04 / 11.10 : freetype vulnerabilities (USN1403-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1126) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1127) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1128) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Type42 font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1129) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed PCF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1130) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1131) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Type1 font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1132) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. (CVE-2012-1133) Mateusz Jurczyk discovered that FreeType did not correctly handle CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 100 certain malformed Type1 font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. (CVE-2012-1134) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1135) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. (CVE-2012-1136) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1137) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1138) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1139) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed PostScript font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1140) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed BDF font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1141) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed Windows FNT/FON font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1142) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash. (CVE-2012-1143) Mateusz Jurczyk discovered that FreeType did not correctly handle certain malformed TrueType font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause FreeType to crash or possibly execute arbitrary code with user privileges. (CVE-2012-1144). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58130 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : openjdk-6 vulnerabilities (USN-1373-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: It was discovered that the Java HttpServer class did not limit the number of headers read from a HTTP request. A remote attacker could CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 101 cause a denial of service by sending special requests that trigger hash collisions predictably. (CVE-2011-5035) ATTENTION: this update changes previous Java HttpServer class behavior by limiting the number of request headers to 200. This may be increased by adjusting the sun.net.httpserver.maxReqHeaders property. It was discovered that the Java Sound component did not properly check buffer boundaries. A remote attacker could use this to cause a denial of service or view confidential data. (CVE-2011-3563) It was discovered that the Java2D implementation does not properly check graphics rendering objects before passing them to the native renderer. A remote attacker could use this to cause a denial of service or to bypass Java sandbox restrictions. (CVE-2012-0497) It was discovered that an off-by-one error exists in the Java ZIP file processing code. An attacker could us this to cause a denial of service through a maliciously crafted ZIP file. (CVE-2012-0501) It was discovered that the Java AWT KeyboardFocusManager did not properly enforce keyboard focus security policy. A remote attacker could use this with an untrusted application or applet to grab keyboard focus and possibly expose confidential data. (CVE-2012-0502) It was discovered that the Java TimeZone class did not properly enforce security policy around setting the default time zone. A remote attacker could use this with an untrusted application or applet to set a new default time zone and bypass Java sandbox restrictions. (CVE-2012-0503) It was discovered the Java ObjectStreamClass did not throw an accurately identifiable exception when a deserialization failure occurred. A remote attacker could use this with an untrusted application or applet to bypass Java sandbox restrictions. (CVE-2012-0505) It was discovered that the Java CORBA implementation did not properly protect repository identifiers on certain CORBA objects. A remote attacker could use this to corrupt object data. (CVE-2012-0506) It was discovered that the Java AtomicReferenceArray class implementation did not properly check if an array was of the expected Object[] type. A remote attacker could use this with a malicious application or applet to bypass Java sandbox restrictions. (CVE-2012-0507). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 58069 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : libvorbis vulnerability (USN-1370-1) Ubuntu Local Security Checks Severity Total Critical 1 Description: It was discovered that libvorbis did not correctly handle certain malformed ogg files. If a user were tricked into opening a specially crafted ogg file with an application that uses libvorbis, an attacker could cause a denial of service or possibly execute arbitrary code with the user's privileges. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 102 Plugin Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : firefox vulnerabilities (USN-1355-1) 57844 Ubuntu Local Security Checks Severity Total Critical 1 Severity Total Critical 1 Description: It was discovered that if a user chose to export their Firefox Sync key the 'Firefox Recovery Key.html' file is saved with incorrect permissions, making the file contents potentially readable by other users. (CVE-2012-0450) Nicolas Gregoire and Aki Helin discovered that when processing a malformed embedded XSLT stylesheet, Firefox can crash due to memory corruption. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0449) It was discovered that memory corruption could occur during the decoding of Ogg Vorbis files. If the user were tricked into opening a specially crafted file, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0444) Tim Abraldes discovered that when encoding certain images types the resulting data was always a fixed size. There is the possibility of sensitive data from uninitialized memory being appended to these images. (CVE-2012-0447) It was discovered that Firefox did not properly perform XPConnect security checks. An attacker could exploit this to conduct cross-site scripting (XSS) attacks through web pages and Firefox extensions. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2012-0446) It was discovered that Firefox did not properly handle node removal in the DOM. If the user were tricked into opening a specially crafted page, an attacker could exploit this to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2011-3659) Alex Dvorov discovered that Firefox did not properly handle sub-frames in form submissions. An attacker could exploit this to conduct phishing attacks using HTML5 frames. (CVE-2012-0445) Ben Hawkes, Christian Holler, Honza Bombas, Jason Orendorff, Jesse Ruderman, Jan Odvarko, Peter Van Der Beken, Bob Clary, and Bill McCloskey discovered memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-0442, CVE-2012-0443). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57685 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : openjdk-6, openjdk-6b18 regression (USN- Ubuntu Local Security Checks 1263-2) Description: USN-1263-1 fixed vulnerabilities in OpenJDK 6. The upstream patch for the chosen plaintext attack on the block-wise AES encryption algorithm (CVE-2011-3389) introduced a regression that caused TLS/SSL connections to fail when using certain algorithms. This update fixes the problem. CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 103 We apologize for the inconvenience. Deepak Bhole discovered a flaw in the Same Origin Policy (SOP) implementation in the IcedTea web browser plugin. This could allow a remote attacker to open connections to certain hosts that should not be permitted. (CVE-2011-3377) Juliano Rizzo and Thai Duong discovered that the block-wise AES encryption algorithm block-wise as used in TLS/SSL was vulnerable to a chosen-plaintext attack. This could allow a remote attacker to view confidential data. (CVE-2011-3389) It was discovered that a type confusion flaw existed in the in the Internet Inter-Orb Protocol (IIOP) deserialization code. A remote attacker could use this to cause an untrusted application or applet to execute arbitrary code by deserializing malicious input. (CVE-2011-3521) It was discovered that the Java scripting engine did not perform SecurityManager checks. This could allow a remote attacker to cause an untrusted application or applet to execute arbitrary code with the full privileges of the JVM. (CVE-2011-3544) It was discovered that the InputStream class used a global buffer to store input bytes skipped. An attacker could possibly use this to gain access to sensitive information. (CVE-2011-3547) It was discovered that a vulnerability existed in the AWTKeyStroke class. A remote attacker could cause an untrusted application or applet to execute arbitrary code. (CVE-2011-3548) It was discovered that an integer overflow vulnerability existed in the TransformHelper class in the Java2D implementation. A remote attacker could use this cause a denial of service via an application or applet crash or possibly execute arbitrary code. (CVE-2011-3551) It was discovered that the default number of available UDP sockets for applications running under SecurityManager restrictions was set too high. A remote attacker could use this with a malicious application or applet exhaust the number of available UDP sockets to cause a denial of service for other applets or applications running within the same JVM. (CVE-2011-3552) It was discovered that Java API for XML Web Services (JAX-WS) could incorrectly expose a stack trace. A remote attacker could potentially use this to gain access to sensitive information. (CVE-2011-3553) It was discovered that the unpacker for pack200 JAR files did not sufficiently check for errors. An attacker could cause a denial of service or possibly execute arbitrary code through a specially crafted pack200 JAR file. (CVE-2011-3554) It was discovered that the RMI registration implementation did not properly restrict privileges of remotely executed code. A remote attacker could use this to execute code with elevated privileges. (CVE-2011-3556, CVE-2011-3557) It was discovered that the HotSpot VM could be made to crash, allowing an attacker to cause a denial of service or CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 104 possibly leak sensitive information. (CVE-2011-3558) It was discovered that the HttpsURLConnection class did not properly perform SecurityManager checks in certain situations. This could allow a remote attacker to bypass restrictions on HTTPS connections. (CVE-2011-3560). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin Plugin Name Family Ubuntu 11.04 / 11.10 : mozvoikko, ubufox update (USN-1306-2) 57458 Ubuntu Local Security Checks Severity Total Critical 1 Severity Total Critical 1 Description: USN-1306-1 fixed vulnerabilities in Firefox. This update provides updated Mozvoikko and ubufox packages for use with Firefox 9. Alexandre Poirot, Chris Blizzard, Kyle Huey, Scoobidiver, Christian Holler, David Baron, Gary Kwong, Jim Blandy, Bob Clary, Jesse Ruderman, Marcia Knous, and Rober Longson discovered several memory safety issues which could possibly be exploited to crash Firefox or execute arbitrary code as the user that invoked Firefox. (CVE-2011-3660) Aki Helin discovered a crash in the YARR regular expression library that could be triggered by JavaScript in web content. (CVE-2011-3661) It was discovered that a flaw in the Mozilla SVG implementation could result in an out-of-bounds memory access if SVG elements were removed during a DOMAttrModified event handler. An attacker could potentially exploit this vulnerability to crash Firefox. (CVE-2011-3658) Mario Heiderich discovered it was possible to use SVG animation accessKey events to detect key strokes even when JavaScript was disabled. A malicious web page could potentially exploit this to trick a user into interacting with a prompt thinking it came from the browser in a context where the user believed scripting was disabled. (CVE-2011-3663) It was discovered that it was possible to crash Firefox when scaling an OGG <video> element to extreme sizes. (CVE-2011-3665). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 57457 Plugin Name Family Ubuntu 11.04 / 11.10 : firefox vulnerabilities (USN-1306-1) Ubuntu Local Security Checks Description: Alexandre Poirot, Chris Blizzard, Kyle Huey, Scoobidiver, Christian Holler, David Baron, Gary Kwong, Jim Blandy, Bob Clary, Jesse Ruderman, Marcia Knous, and Rober Longson discovered several memory safety issues which could possibly be exploited to crash Firefox or execute arbitrary code as the user that invoked Firefox. (CVE-2011-3660) Aki Helin discovered a crash in the YARR regular expression library that could be triggered by JavaScript in web content. (CVE-2011-3661) It was discovered that a flaw in the Mozilla SVG implementation could result in an out-of-bounds memory access if SVG elements were removed during a DOMAttrModified event handler. An attacker could potentially CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 105 exploit this vulnerability to crash Firefox. (CVE-2011-3658) Mario Heiderich discovered it was possible to use SVG animation accessKey events to detect key strokes even when JavaScript was disabled. A malicious web page could potentially exploit this to trick a user into interacting with a prompt thinking it came from the browser in a context where the user believed scripting was disabled. (CVE-2011-3663) It was discovered that it was possible to crash Firefox when scaling an OGG <video> element to extreme sizes. (CVE-2011-3665). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56945 Plugin Name Family Ubuntu 11.04 / 11.10 : mozvoikko, ubufox update (USN-1277-2) Ubuntu Local Security Checks Severity Total Critical 1 Description: USN-1277-1 fixed vulnerabilities in Firefox. This update provides updated Mozvoikko and ubufox packages for use with Firefox 8. Yosuke Hasegawa discovered that the Mozilla browser engine mishandled invalid sequences in the Shift-JIS encoding. It may be possible to trigger this crash without the use of debugging APIs, which might allow malicious websites to exploit this vulnerability. An attacker could possibly use this flaw this to steal data or inject malicious scripts into web content. (CVE-2011-3648) Marc Schoenefeld discovered that using Firebug to profile a JavaScript file with many functions would cause Firefox to crash. An attacker might be able to exploit this without using the debugging APIs, which could potentially remotely crash the browser, resulting in a denial of service. (CVE-2011-3650) Jason Orendorff, Boris Zbarsky, Gregg Tavares, Mats Palmgren, Christian Holler, Jesse Ruderman, Simona Marcu, Bob Clary, and William McCloskey discovered multiple memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. An attacker might be able to use these flaws to execute arbitrary code with the privileges of the user invoking Firefox or possibly crash the browser resulting in a denial of service. (CVE-2011-3651) It was discovered that Firefox could be caused to crash under certain conditions, due to an unchecked allocation failure, resulting in a denial of service. It might also be possible to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2011-3652) Aki Helin discovered that Firefox does not properly handle links from SVG mpath elements to non-SVG elements. An attacker could use this vulnerability to crash Firefox, resulting in a denial of service, or possibly execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2011-3654) It was discovered that an internal privilege check failed to respect the NoWaiverWrappers introduced with Firefox 4. An attacker could possibly use this to gain elevated privileges within the browser for web content. (CVE-2011-3655). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 106 Plugin 56944 Plugin Name Family Ubuntu 11.04 / 11.10 : firefox vulnerabilities (USN-1277-1) Ubuntu Local Security Checks Severity Total Critical 1 Severity Total Critical 1 Description: Yosuke Hasegawa discovered that the Mozilla browser engine mishandled invalid sequences in the Shift-JIS encoding. It may be possible to trigger this crash without the use of debugging APIs, which might allow malicious websites to exploit this vulnerability. An attacker could possibly use this flaw this to steal data or inject malicious scripts into web content. (CVE-2011-3648) Marc Schoenefeld discovered that using Firebug to profile a JavaScript file with many functions would cause Firefox to crash. An attacker might be able to exploit this without using the debugging APIs, which could potentially remotely crash the browser, resulting in a denial of service. (CVE-2011-3650) Jason Orendorff, Boris Zbarsky, Gregg Tavares, Mats Palmgren, Christian Holler, Jesse Ruderman, Simona Marcu, Bob Clary, and William McCloskey discovered multiple memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. An attacker might be able to use these flaws to execute arbitrary code with the privileges of the user invoking Firefox or possibly crash the browser resulting in a denial of service. (CVE-2011-3651) It was discovered that Firefox could be caused to crash under certain conditions, due to an unchecked allocation failure, resulting in a denial of service. It might also be possible to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2011-3652) Aki Helin discovered that Firefox does not properly handle links from SVG mpath elements to non-SVG elements. An attacker could use this vulnerability to crash Firefox, resulting in a denial of service, or possibly execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2011-3654) It was discovered that an internal privilege check failed to respect the NoWaiverWrappers introduced with Firefox 4. An attacker could possibly use this to gain elevated privileges within the browser for web content. (CVE-2011-3655). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56860 Plugin Name Family Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : icedtea-web, openjdk-6, openjdk-6b18 vulnerabilities (USN-1263-1) Ubuntu Local Security Checks Description: Deepak Bhole discovered a flaw in the Same Origin Policy (SOP) implementation in the IcedTea web browser plugin. This could allow a remote attacker to open connections to certain hosts that should not be permitted. (CVE-2011-3377) Juliano Rizzo and Thai Duong discovered that the block-wise AES encryption algorithm block-wise as used in TLS/SSL was vulnerable to a chosen-plaintext attack. This could allow a remote attacker to view confidential data. (CVE-2011-3389) It was discovered that a type confusion flaw existed in the in the Internet Inter-Orb Protocol (IIOP) deserialization code. A remote attacker could use this to cause an untrusted application or applet to execute arbitrary code by deserializing malicious input. (CVE-2011-3521) It was discovered that the Java scripting engine did not perform CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 107 SecurityManager checks. This could allow a remote attacker to cause an untrusted application or applet to execute arbitrary code with the full privileges of the JVM. (CVE-2011-3544) It was discovered that the InputStream class used a global buffer to store input bytes skipped. An attacker could possibly use this to gain access to sensitive information. (CVE-2011-3547) It was discovered that a vulnerability existed in the AWTKeyStroke class. A remote attacker could cause an untrusted application or applet to execute arbitrary code. (CVE-2011-3548) It was discovered that an integer overflow vulnerability existed in the TransformHelper class in the Java2D implementation. A remote attacker could use this cause a denial of service via an application or applet crash or possibly execute arbitrary code. (CVE-2011-3551) It was discovered that the default number of available UDP sockets for applications running under SecurityManager restrictions was set too high. A remote attacker could use this with a malicious application or applet exhaust the number of available UDP sockets to cause a denial of service for other applets or applications running within the same JVM. (CVE-2011-3552) It was discovered that Java API for XML Web Services (JAX-WS) could incorrectly expose a stack trace. A remote attacker could potentially use this to gain access to sensitive information. (CVE-2011-3553) It was discovered that the unpacker for pack200 JAR files did not sufficiently check for errors. An attacker could cause a denial of service or possibly execute arbitrary code through a specially crafted pack200 JAR file. (CVE-2011-3554) It was discovered that the RMI registration implementation did not properly restrict privileges of remotely executed code. A remote attacker could use this to execute code with elevated privileges. (CVE-2011-3556, CVE-2011-3557) It was discovered that the HotSpot VM could be made to crash, allowing an attacker to cause a denial of service or possibly leak sensitive information. (CVE-2011-3558) It was discovered that the HttpsURLConnection class did not properly perform SecurityManager checks in certain situations. This could allow a remote attacker to bypass restrictions on HTTPS connections. (CVE-2011-3560). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56387 Plugin Name Family Ubuntu 11.04 : mozvoikko, ubufox, webfav update (USN-1222-2) Ubuntu Local Security Checks Severity Total Critical 1 Description: USN-1222-1 fixed vulnerabilities in Firefox. This update provides updated packages for use with Firefox 7. Benjamin Smedberg, Bob Clary, Jesse Ruderman, Bob Clary, Andrew McCreight, Andreas Gal, Gary Kwong, Igor Bukanov, Jason Orendorff, Jesse Ruderman, and Marcia Knous discovered multiple memory vulnerabilities in the browser rendering engine. An attacker could use these to possibly execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2011-2995, CVE-2011-2997) Boris Zbarsky discovered that a frame named 'location' could shadow the window.location object unless a script in a page CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 108 grabbed a reference to the true object before the frame was created. This is in violation of the Same Origin Policy. A malicious website could possibly use this to access another website or the local file system. (CVE-2011-2999) Ian Graham discovered that when multiple Location headers were present, Firefox would use the second one resulting in a possible CRLF injection attack. CRLF injection issues can result in a wide variety of attacks, such as XSS (Cross-Site Scripting) vulnerabilities, browser cache poisoning, and cookie theft. (CVE-2011-3000) Mariusz Mlynski discovered that if the user could be convinced to hold down the enter key, a malicious website could potential pop up a download dialog and the default open action would be selected or lead to the installation of an arbitrary add-on. This would result in potentially malicious content being run with privileges of the user invoking Firefox. (CVE-2011-2372, CVE-2011-3001) Michael Jordon and Ben Hawkes discovered flaws in WebGL. If a user were tricked into opening a malicious page, an attacker could cause the browser to crash. (CVE-2011-3002, CVE-2011-3003) It was discovered that Firefox did not properly free memory when processing ogg files. If a user were tricked into opening a malicious page, an attacker could cause the browser to crash. (CVE-2011-3005) David Rees and Aki Helin discovered a problems in the JavaScript engine. An attacker could exploit this to crash the browser or potentially escalate privileges within the browser. (CVE-2011-3232). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 56347 Plugin Name Family Ubuntu 11.04 : Firefox vulnerabilities (USNUbuntu Local Security Checks 1222-1) Severity Total Critical 1 Description: Benjamin Smedberg, Bob Clary, Jesse Ruderman, Bob Clary, Andrew McCreight, Andreas Gal, Gary Kwong, Igor Bukanov, Jason Orendorff, Jesse Ruderman, and Marcia Knous discovered multiple memory vulnerabilities in the browser rendering engine. An attacker could use these to possibly execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2011-2995, CVE-2011-2997) Boris Zbarsky discovered that a frame named 'location' could shadow the window.location object unless a script in a page grabbed a reference to the true object before the frame was created. This is in violation of the Same Origin Policy. A malicious website could possibly use this to access another website or the local file system. (CVE-2011-2999) Ian Graham discovered that when multiple Location headers were present, Firefox would use the second one resulting in a possible CRLF injection attack. CRLF injection issues can result in a wide variety of attacks, such as XSS (Cross-Site Scripting) vulnerabilities, browser cache poisoning, and cookie theft. (CVE-2011-3000) Mariusz Mlynski discovered that if the user could be convinced to hold down the enter key, a malicious website could potential pop up a download dialog and the default open action would be selected or lead to the installation of an arbitrary add-on. This would result in CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 109 potentially malicious content being run with privileges of the user invoking Firefox. (CVE-2011-2372, CVE-2011-3001) Michael Jordon and Ben Hawkes discovered flaws in WebGL. If a user were tricked into opening a malicious page, an attacker could cause the browser to crash. (CVE-2011-3002, CVE-2011-3003) It was discovered that Firefox did not properly free memory when processing ogg files. If a user were tricked into opening a malicious page, an attacker could cause the browser to crash. (CVE-2011-3005) David Rees and Aki Helin discovered a problems in the JavaScript engine. An attacker could exploit this to crash the browser or potentially escalate privileges within the browser. (CVE-2011-3232). Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 33850 Plugin Name Family Unsupported Unix Operating System General Severity Total Critical 1 Severity Total Critical 1 Severity Total High 1 Description: According to its version, the remote Unix operating system is obsolete and is no longer maintained by its vendor or provider. Lack of support implies that no new security patches will be released for it. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 23968 Plugin Name Family phpBB < 2.0.22 Multiple Vulnerabilities CGI abuses Description: The version of phpBB installed on the remote host fails to properly block 'bad' redirection targets. In addition, it reportedly contains a non-persistent cross-site scripting flaw involving its private messaging functionality and several other issues. At a minimum, a remote attacker can leverage these flaws to launch cross-site scripting attacks against the affected application. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6556 Plugin Name Family PHP 5.3.x < 5.3.15 Multiple Vulnerabilities Web Servers Description: PHP versions 5.3.x earlier than 5.3.15 are affected by the following vulnerabilities. - - An unspecified overflow vulnerability exists in the function '_php_stream_scandir' in the file 'main/streams/streams.c'. (CVE-2012-2688) - An unspecified error exists that can allow the 'open_basedir' constraint to be bypassed. (CVE-2012-3365) Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6530 Plugin Name Family PHP 5.4.x < 5.4.5 _php_stream_scandir Overflow Web Servers Severity Total High 1 Description: PHP versions earlier than 5.4.5 are affected by the following vulnerabilities. - An unspecified overflow vulnerability in the function '_php_stream_scandir' in the file 'main/streams/streams.c' Hosts in Repository 'net_10_31_112': CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 110 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu Plugin 6304 Plugin Name Family PHP 5.3.9 php_register_variable_ex() Code Execution Web Servers Severity Total High 1 Description: PHP version 5.3.9 is reportedly affected by a code execution vulnerability. Specifically, the fix for the hash collision denial of service vulnerability (CVE-2011-4885) itself has introduced a remote code execution vulnerability in the php_register_variable_ex() in the file php_variables.c. A new configuration variable, max_input_vars, was added as part of the fix. If the number of input variables exceeds this value and the variable being processed is an array, code execution can occur. Hosts in Repository 'net_10_31_112': 10.31.112.10 - MAC Address: 00:0c:29:43:f9:3b DNS Name: ubuntu CVSS 10.0 to 10.0 Qualitative Risk Analysis with CVSS Scores 111