Newest Plugins

Ubuntu 14.04 : linux vulnerabilities (USN-2395-1)


Synopsis:

The remote Ubuntu host is missing one or more security-related patches.

Description:

Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles
noncanonical addresses when emulating instructions that change the rip
(Instruction Pointer). A guest user with access to I/O or the MMIO can
use this flaw to cause a denial of service (system crash) of the
guest. (CVE-2014-3647)

A flaw was discovered with the handling of the invept instruction in
the KVM (Kernel Virtual Machine) subsystem of the Linux kernel. An
unprivileged guest user could exploit this flaw to cause a denial of
service (system crash) on the guest. (CVE-2014-3646)

Lars Bull reported a race condition in the PIT (programmable interrupt
timer) emulation in the KVM (Kernel Virtual Machine) subsystem of the
Linux kernel. A local guest user with access to PIT i/o ports could
exploit this flaw to cause a denial of service (crash) on the host.
(CVE-2014-3611)

Lars Bull and Nadav Amit reported a flaw in how KVM (the Kernel
Virtual Machine) handles noncanonical writes to certain MSR registers.
A privileged guest user can exploit this flaw to cause a denial of
service (kernel panic) on the host. (CVE-2014-3610)

Raphael Geissert reported a NULL pointer dereference in the Linux
kernel's CIFS client. A remote CIFS server could cause a denial of
service (system crash) or possibly have other unspecified impact by
deleting IPC$ share during resolution of DFS referrals.
(CVE-2014-7145).

Solution :

Update the affected linux-image-3.13.0-39-generic,
linux-image-3.13.0-39-generic-lpae and / or
linux-image-3.13.0-39-lowlatency packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

Ubuntu 12.04 LTS : linux-lts-trusty vulnerabilities (USN-2394-1)


Synopsis:

The remote Ubuntu host is missing one or more security-related patches.

Description:

Nadav Amit reported that the KVM (Kernel Virtual Machine) mishandles
noncanonical addresses when emulating instructions that change the rip
(Instruction Pointer). A guest user with access to I/O or the MMIO can
use this flaw to cause a denial of service (system crash) of the
guest. (CVE-2014-3647)

A flaw was discovered with the handling of the invept instruction in
the KVM (Kernel Virtual Machine) subsystem of the Linux kernel. An
unprivileged guest user could exploit this flaw to cause a denial of
service (system crash) on the guest. (CVE-2014-3646)

Lars Bull reported a race condition in the PIT (programmable interrupt
timer) emulation in the KVM (Kernel Virtual Machine) subsystem of the
Linux kernel. A local guest user with access to PIT i/o ports could
exploit this flaw to cause a denial of service (crash) on the host.
(CVE-2014-3611)

Lars Bull and Nadav Amit reported a flaw in how KVM (the Kernel
Virtual Machine) handles noncanonical writes to certain MSR registers.
A privileged guest user can exploit this flaw to cause a denial of
service (kernel panic) on the host. (CVE-2014-3610)

Raphael Geissert reported a NULL pointer dereference in the Linux
kernel's CIFS client. A remote CIFS server could cause a denial of
service (system crash) or possibly have other unspecified impact by
deleting IPC$ share during resolution of DFS referrals.
(CVE-2014-7145).

Solution :

Update the affected linux-image-3.13.0-39-generic and / or
linux-image-3.13.0-39-generic-lpae packages.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

Ubuntu 10.04 LTS / 12.04 LTS / 14.04 / 14.10 : wget vulnerability (USN-2393-1)


Synopsis:

The remote Ubuntu host is missing a security-related patch.

Description:

HD Moore discovered that Wget contained a path traversal vulnerability
when downloading symlinks using FTP. A malicious remote FTP server or
a man in the middle could use this issue to cause Wget to overwrite
arbitrary files, possibly leading to arbitrary code execution.

Solution :

Update the affected wget package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

Ubuntu 14.10 : systemd-shim vulnerability (USN-2392-1)


Synopsis:

The remote Ubuntu host is missing a security-related patch.

Description:

It was discovered that systemd-shim incorrectly shipped with a
debugging clause enabled. A local attacker could possibly use this
issue to cause a denial of service.

Solution :

Update the affected systemd-shim package.

Risk factor :

High

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

Ubuntu 10.04 LTS / 12.04 LTS / 14.04 / 14.10 : php5 vulnerabilities (USN-2391-1)


Synopsis:

The remote Ubuntu host is missing one or more security-related patches.

Description:

Symeon Paraschoudis discovered that PHP incorrectly handled the
mkgmtime function. A remote attacker could possibly use this issue to
cause PHP to crash, resulting in a denial of service. (CVE-2014-3668)

Symeon Paraschoudis discovered that PHP incorrectly handled
unserializing objects. A remote attacker could possibly use this issue
to cause PHP to crash, resulting in a denial of service.
(CVE-2014-3669)

Otto Ebeling discovered that PHP incorrectly handled the
exif_thumbnail function. A remote attacker could use this issue to
cause PHP to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2014-3670)

Francisco Alonso that PHP incorrectly handled ELF files in the
fileinfo extension. A remote attacker could possibly use this issue to
cause PHP to crash, resulting in a denial of service. (CVE-2014-3710)

It was discovered that PHP incorrectly handled NULL bytes when
processing certain URLs with the curl functions. A remote attacker
could possibly use this issue to bypass filename restrictions and
obtain access to sensitive files. (No CVE number).

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Ubuntu Security Notice (C) 2014 Canonical, Inc. / NASL script (C) 2014 Tenable Network Security, Inc.

RHEL 5 : php53 (RHSA-2014:1768)


Synopsis:

The remote Red Hat host is missing one or more security updates.

Description:

Updated php53 packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

PHP is an HTML-embedded scripting language commonly used with the
Apache HTTP Server.

A buffer overflow flaw was found in the Exif extension. A specially
crafted JPEG or TIFF file could cause a PHP application using the
exif_thumbnail() function to crash or, possibly, execute arbitrary
code with the privileges of the user running that PHP application.
(CVE-2014-3670)

An integer overflow flaw was found in the way custom objects were
unserialized. Specially crafted input processed by the unserialize()
function could cause a PHP application to crash. (CVE-2014-3669)

An out-of-bounds read flaw was found in the way the File Information
(fileinfo) extension parsed Executable and Linkable Format (ELF)
files. A remote attacker could use this flaw to crash a PHP
application using fileinfo via a specially crafted ELF file.
(CVE-2014-3710)

An out of bounds read flaw was found in the way the xmlrpc extension
parsed dates in the ISO 8601 format. A specially crafted XML-RPC
request or response could possibly cause a PHP application to crash.
(CVE-2014-3668)

The CVE-2014-3710 issue was discovered by Francisco Alonso of Red Hat
Product Security.

All php53 users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After
installing the updated packages, the httpd daemon must be restarted
for the update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2014-3668.html
https://www.redhat.com/security/data/cve/CVE-2014-3669.html
https://www.redhat.com/security/data/cve/CVE-2014-3670.html
https://www.redhat.com/security/data/cve/CVE-2014-3710.html
http://rhn.redhat.com/errata/RHSA-2014-1768.html

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

RHEL 6 / 7 : php (RHSA-2014:1767)


Synopsis:

The remote Red Hat host is missing one or more security updates.

Description:

Updated php packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

PHP is an HTML-embedded scripting language commonly used with the
Apache HTTP Server.

A buffer overflow flaw was found in the Exif extension. A specially
crafted JPEG or TIFF file could cause a PHP application using the
exif_thumbnail() function to crash or, possibly, execute arbitrary
code with the privileges of the user running that PHP application.
(CVE-2014-3670)

An integer overflow flaw was found in the way custom objects were
unserialized. Specially crafted input processed by the unserialize()
function could cause a PHP application to crash. (CVE-2014-3669)

An out-of-bounds read flaw was found in the way the File Information
(fileinfo) extension parsed Executable and Linkable Format (ELF)
files. A remote attacker could use this flaw to crash a PHP
application using fileinfo via a specially crafted ELF file.
(CVE-2014-3710)

An out of bounds read flaw was found in the way the xmlrpc extension
parsed dates in the ISO 8601 format. A specially crafted XML-RPC
request or response could possibly cause a PHP application to crash.
(CVE-2014-3668)

The CVE-2014-3710 issue was discovered by Francisco Alonso of Red Hat
Product Security.

All php users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing
the updated packages, the httpd daemon must be restarted for the
update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2014-3668.html
https://www.redhat.com/security/data/cve/CVE-2014-3669.html
https://www.redhat.com/security/data/cve/CVE-2014-3670.html
https://www.redhat.com/security/data/cve/CVE-2014-3710.html
http://rhn.redhat.com/errata/RHSA-2014-1767.html

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

RHEL 6 / 7 : wget (RHSA-2014:1764)


Synopsis:

The remote Red Hat host is missing one or more security updates.

Description:

An updated wget package that fixes one security issue is now available
for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The wget package provides the GNU Wget file retrieval utility for
HTTP, HTTPS, and FTP protocols.

A flaw was found in the way Wget handled symbolic links. A malicious
FTP server could allow Wget running in the mirror mode (using the '-m'
command line option) to write an arbitrary file to a location writable
to by the user running Wget, possibly leading to code execution.
(CVE-2014-4877)

Note: This update changes the default value of the --retr-symlinks
option. The file symbolic links are now traversed by default and
pointed-to files are retrieved rather than creating a symbolic link
locally.

Red Hat would like to thank the GNU Wget project for reporting this
issue. Upstream acknowledges HD Moore of Rapid7, Inc as the original
reporter.

All users of wget are advised to upgrade to this updated package,
which contains a backported patch to correct this issue.

See also :

https://www.redhat.com/security/data/cve/CVE-2014-4877.html
http://rhn.redhat.com/errata/RHSA-2014-1764.html

Solution :

Update the affected wget and / or wget-debuginfo packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2014-3085)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

Description of changes:

[2.6.39-400.215.12.el5uek]
- USB: whiteheat: Added bounds checking for bulk command response (James
Forshaw) [Orabug: 19849335] {CVE-2014-3185}
- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849318]
{CVE-2014-3181}
- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug:
19905687] {CVE-2014-3611}

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004589.html
https://oss.oracle.com/pipermail/el-errata/2014-October/004590.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3084)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

Description of changes:

kernel-uek
[3.8.13-44.1.4.el6uek]
- USB: whiteheat: Added bounds checking for bulk command response (James
Forshaw) [Orabug: 19849334] {CVE-2014-3185}
- HID: fix a couple of off-by-ones (Jiri Kosina) [Orabug: 19849317]
{CVE-2014-3181}
- kvm: vmx: handle invvpid vm exit gracefully (Petr Matousek) [Orabug:
19906300] {CVE-2014-3646}
- nEPT: Nested INVEPT (Nadav Har'El) [Orabug: 19906267] {CVE-2014-3645}
- KVM: x86: Improve thread safety in pit (Andy Honig) [Orabug:
19905686] {CVE-2014-3611}

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004593.html
https://oss.oracle.com/pipermail/el-errata/2014-October/004588.html

Solution :

Update the affected unbreakable enterprise kernel packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 5 : php53 (ELSA-2014-1768)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1768 :

Updated php53 packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

PHP is an HTML-embedded scripting language commonly used with the
Apache HTTP Server.

A buffer overflow flaw was found in the Exif extension. A specially
crafted JPEG or TIFF file could cause a PHP application using the
exif_thumbnail() function to crash or, possibly, execute arbitrary
code with the privileges of the user running that PHP application.
(CVE-2014-3670)

An integer overflow flaw was found in the way custom objects were
unserialized. Specially crafted input processed by the unserialize()
function could cause a PHP application to crash. (CVE-2014-3669)

An out-of-bounds read flaw was found in the way the File Information
(fileinfo) extension parsed Executable and Linkable Format (ELF)
files. A remote attacker could use this flaw to crash a PHP
application using fileinfo via a specially crafted ELF file.
(CVE-2014-3710)

An out of bounds read flaw was found in the way the xmlrpc extension
parsed dates in the ISO 8601 format. A specially crafted XML-RPC
request or response could possibly cause a PHP application to crash.
(CVE-2014-3668)

The CVE-2014-3710 issue was discovered by Francisco Alonso of Red Hat
Product Security.

All php53 users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After
installing the updated packages, the httpd daemon must be restarted
for the update to take effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004599.html

Solution :

Update the affected php53 packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 / 7 : php (ELSA-2014-1767)


Synopsis:

The remote Oracle Linux host is missing one or more security updates.

Description:

From Red Hat Security Advisory 2014:1767 :

Updated php packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

PHP is an HTML-embedded scripting language commonly used with the
Apache HTTP Server.

A buffer overflow flaw was found in the Exif extension. A specially
crafted JPEG or TIFF file could cause a PHP application using the
exif_thumbnail() function to crash or, possibly, execute arbitrary
code with the privileges of the user running that PHP application.
(CVE-2014-3670)

An integer overflow flaw was found in the way custom objects were
unserialized. Specially crafted input processed by the unserialize()
function could cause a PHP application to crash. (CVE-2014-3669)

An out-of-bounds read flaw was found in the way the File Information
(fileinfo) extension parsed Executable and Linkable Format (ELF)
files. A remote attacker could use this flaw to crash a PHP
application using fileinfo via a specially crafted ELF file.
(CVE-2014-3710)

An out of bounds read flaw was found in the way the xmlrpc extension
parsed dates in the ISO 8601 format. A specially crafted XML-RPC
request or response could possibly cause a PHP application to crash.
(CVE-2014-3668)

The CVE-2014-3710 issue was discovered by Francisco Alonso of Red Hat
Product Security.

All php users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing
the updated packages, the httpd daemon must be restarted for the
update to take effect.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004598.html
https://oss.oracle.com/pipermail/el-errata/2014-October/004597.html

Solution :

Update the affected php packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Linux 6 / 7 : wget (ELSA-2014-1764)


Synopsis:

The remote Oracle Linux host is missing a security update.

Description:

From Red Hat Security Advisory 2014:1764 :

An updated wget package that fixes one security issue is now available
for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The wget package provides the GNU Wget file retrieval utility for
HTTP, HTTPS, and FTP protocols.

A flaw was found in the way Wget handled symbolic links. A malicious
FTP server could allow Wget running in the mirror mode (using the '-m'
command line option) to write an arbitrary file to a location writable
to by the user running Wget, possibly leading to code execution.
(CVE-2014-4877)

Note: This update changes the default value of the --retr-symlinks
option. The file symbolic links are now traversed by default and
pointed-to files are retrieved rather than creating a symbolic link
locally.

Red Hat would like to thank the GNU Wget project for reporting this
issue. Upstream acknowledges HD Moore of Rapid7, Inc as the original
reporter.

All users of wget are advised to upgrade to this updated package,
which contains a backported patch to correct this issue.

See also :

https://oss.oracle.com/pipermail/el-errata/2014-October/004595.html
https://oss.oracle.com/pipermail/el-errata/2014-October/004596.html

Solution :

Update the affected wget package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 21 : sddm-0.9.0-2.20141007git6a28c29b.fc21 (2014-12442)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Bump to latest upstream git (and a new release), fixes CVE-2014-7271
and CVE-2014-7272

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=1148659
https://bugzilla.redhat.com/show_bug.cgi?id=1149608
https://bugzilla.redhat.com/show_bug.cgi?id=1149610
http://www.nessus.org/u?72798e0b

Solution :

Update the affected sddm package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

CentOS 6 / 7 : wget (CESA-2014:1764)


Synopsis:

The remote CentOS host is missing a security update.

Description:

An updated wget package that fixes one security issue is now available
for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The wget package provides the GNU Wget file retrieval utility for
HTTP, HTTPS, and FTP protocols.

A flaw was found in the way Wget handled symbolic links. A malicious
FTP server could allow Wget running in the mirror mode (using the '-m'
command line option) to write an arbitrary file to a location writable
to by the user running Wget, possibly leading to code execution.
(CVE-2014-4877)

Note: This update changes the default value of the --retr-symlinks
option. The file symbolic links are now traversed by default and
pointed-to files are retrieved rather than creating a symbolic link
locally.

Red Hat would like to thank the GNU Wget project for reporting this
issue. Upstream acknowledges HD Moore of Rapid7, Inc as the original
reporter.

All users of wget are advised to upgrade to this updated package,
which contains a backported patch to correct this issue.

See also :

http://www.nessus.org/u?e54cac9b
http://www.nessus.org/u?c4172f51

Solution :

Update the affected wget package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

SSLv3 Padding Oracle On Downgraded Legacy Encryption in Cisco ASA Software (cisco-sa-20141015-poodle) (POODLE)


Synopsis:

The remote device is affected by a man-in-the-middle (MitM)
information disclosure vulnerability known as POODLE.

Description:

The remote Cisco ASA device is affected by a man-in-the-middle (MitM)
information disclosure vulnerability known as POODLE. The
vulnerability is due to the way SSL 3.0 handles padding bytes when
decrypting messages encrypted using block ciphers in cipher block
chaining (CBC) mode. A MitM attacker can decrypt a selected byte of a
cipher text in as few as 256 tries if they are able to force a victim
application to repeatedly send the same data over newly created SSL
3.0 connections.

Note that all versions of ASA are affected
however, the workaround
does not work for versions 8.0.x, 8.1.x, 9.0.x, and 9.1(1)x. Please
refer to the advisory or contact the vendor for possible solutions.

See also :

http://www.nessus.org/u?7453d3be
https://tools.cisco.com/bugsearch/bug/CSCur23709
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Solution :

Apply the workaround by disabling SSLv3 referenced in the Cisco bug ID
CSCur23709, or contact the vendor.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Enterprise Data Quality Multiple Vulnerabilities (October 2014 CPU)


Synopsis:

The remote host is affected by multiple vulnerabilities.

Description:

The version of Oracle Enterprise Data Quality running on the remote
host is affected by multiple vulnerabilities :

- A flaw in Apache Commons BeanUtils allows a remote
attacker to execute arbitrary code by manipulating the
ClassLoader. (CVE-2014-0114)

- A flaw in Apache Tomcat allows a remote attacker to
replace the XML parsers and thereby gain access to
sensitive information. (CVE-2014-0119)

See also :

http://www.nessus.org/u?6dcc7b47

Solution :

Apply the appropriate patch according to the October 2014 Oracle
Critical Patch Update advisory.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Enterprise Data Quality Director Detection


Synopsis:

The remote host is running a data quality tool.

Description:

Oracle Enterprise Data Quality Director, a tool for profiling,
managing, and auditing data, was detected on the remote host.

See also :

http://www.oracle.com/technetwork/middleware/oedq/overview/index.html

Solution :

n/a

Risk factor :

None

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Oracle Enterprise Data Quality Dashboard Detection


Synopsis:

The remote host is running a dashboard application for a data quality
tool.

Description:

Oracle Enterprise Data Quality Dashboard, a tool for profiling,
managing, and auditing data, was detected on the remote host.

See also :

http://www.oracle.com/technetwork/middleware/oedq/overview/index.html

Solution :

n/a

Risk factor :

None

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal CKEditor XSS (PI24992, PI26456)


Synopsis:

The remote Windows host has web portal software installed that is
affected by a cross-site scripting vulnerability.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by a cross-site scripting vulnerability in the CKEditor
component due to improper validation of user-supplied input. A remote
attacker can exploit this flaw using a specially crafted URL to
execute scripts in a user's web browser within the security context of
the hosting website. This allows an attacker to steal a user's
cookie-based authentication credentials.

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684650

Solution :

IBM has published Interim Fix PI27710. Refer to IBM's advisory for
more information.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal Information Disclosure Vulnerability (PI27710)


Synopsis:

The remote Windows host has web portal software installed that is
affected by an information disclosure vulnerability.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by an information disclosure vulnerability that allows a
remote attacker to identify whether or not a file exists based on the
webserver error codes.

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651

Solution :

IBM has published Interim Fix PI27710. Refer to IBM's advisory for
more information.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal Entity Expansion DoS (PI24622)


Synopsis:

The remote Windows host has web portal software installed that is
affected by a denial of service vulnerability.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by a denial of service vulnerability. A flaw exists that is
caused by improper recursion detection during entity expansion. By
tricking a user into opening a specially crafted XML document, an
attacker can cause the system to crash, resulting in a denial of
service.

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651

Solution :

IBM has published Interim Fix PI24622. Refer to IBM's advisory for
more information.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:N/A:P)
CVSS Temporal Score : 3.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal Unspecified Vulnerability (PI25993)


Synopsis:

The remote Windows host has web portal software installed that is
affected by an unspecified vulnerability.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by an unspecified code execution vulnerability that allows an
authenticated attacker to execute arbitrary code on the system.

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651

Solution :

IBM has published Interim Fix PI25993. Refer to IBM's advisory for
more information.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal 8.5.0 < 8.5.0 CF03 Multiple Vulnerabilities


Synopsis:

The remote Windows host has web portal software installed that is
affected by multiple vulnerabilities.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by the multiple vulnerabilities :

- An unspecified vulnerability exists that allows an
authenticated attacker to execute arbitrary code on the
system. (CVE-2014-4808)

- A flaw exists that is caused by improper recursion
detection during entity expansion. By tricking a user
into opening a specially-crafted XML document, an
attacker can cause the system to crash, resulting in a
denial of service. (CVE-2014-4814)

- An information disclosure vulnerability that allows a
remote attacker to identify whether or not a file exists
based on the webserver error codes. (CVE-2014-4821)

- A flaw exists in CKEditor in the Preview plugin that
allows an XSS attack. The flaw exists due to
'plugins/preview/preview.html' not properly validating
user-supplied input before returning it to users. This
allows an attacker to send a specially crafted request
designed to steal cookie-based authentication
credentials. (CVE-2014-5191)

- A cross-site request forgery vulnerability exists due
to improper validation of user-supplied input. By
tricking a user into visiting a malicious website, a
remote attacker can perform cross-site scripting
attacks, web cache poisoning, and other malicious
activities. (CVE-2014-6125)

- A cross-site scripting vulnerability exists due to
improper validation of user-supplied input. A remote
attacker can execute code within a victim's web browser
within the context of the hosted site. This could lead
to the compromise of the user's cookie-based
authentication credentials. (CVE-2014-6126)

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651
http://www.nessus.org/u?2e77e115
http://www.nessus.org/u?60595c5b
https://www-304.ibm.com/support/docview.wss?uid=swg21684650

Solution :

IBM has published a cumulative fix (CF03) for WebSphere Portal 8.5.0.
Refer to IBM's advisory for more information.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal 8.0.0.x < 8.0.0.1 CF14 Multiple Vulnerabilities


Synopsis:

The remote Windows host has web portal software installed that is
affected by multiple vulnerabilities.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by multiple vulnerabilities :

- An unspecified vulnerability exists that allows an
authenticated attacker to execute arbitrary code on the
system. (CVE-2014-4808)

- A flaw exists that is caused by improper recursion
detection during entity expansion. By tricking a user
into opening a specially-crafted XML document, an
attacker can cause the system to crash, resulting in a
denial of service. (CVE-2014-4814)

- An information disclosure vulnerability that allows a
remote attacker to identify whether or not a file exists
based on the webserver error codes. (CVE-2014-4821)

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651
http://www.nessus.org/u?2e77e115

Solution :

IBM has published a cumulative fix (CF14) for WebSphere Portal
8.0.0.1. Refer to IBM's advisory for more information.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal 6.1.5.x < 6.1.5.3 CF27 Multiple Vulnerabilities


Synopsis:

The remote Windows host has web portal software installed that is
affected by multiple vulnerabilities.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by multiple vulnerabilities :

- A flaw in the 'boot_config.jsp' script that cross-site
scripting due to the improper validation of
user-supplied input. An attacker can exploit this issue
to execute code in the security context of a user's
browser to steal authentication cookies. (CVE-2014-0952)

- An unspecified cross-site scripting vulnerability due to
improper user input validation by a JSP script. An
attacker can exploit this issue to execute code in the
security context of a user's web browser to steal
authentication cookies. (CVE-2014-0956)

- An unspecified vulnerability exists that allows an
authenticated attacker to execute arbitrary code on the
system. (CVE-2014-4808)

- A flaw exists that is caused by improper recursion
detection during entity expansion. By tricking a user
into opening a specially-crafted XML document, an
attacker can cause the system to crash, resulting in a
denial of service. (CVE-2014-4814)

- An information disclosure vulnerability that allows a
remote attacker to identify whether or not a file exists
based on the webserver error codes. (CVE-2014-4821)

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651
http://www.nessus.org/u?2e77e115
https://www-01.ibm.com/support/docview.wss?uid=swg21672572

Solution :

IBM has published a cumulative fix (CF27) for WebSphere Portal
6.1.5.3. Refer to IBM's advisory for more information.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

IBM WebSphere Portal 6.1.0.x < 6.1.0.6 CF27 Multiple Vulnerabilities


Synopsis:

The remote Windows host has web portal software installed that is
affected by multiple vulnerabilities.

Description:

The version of IBM WebSphere Portal installed on the remote host is
affected by multiple vulnerabilities :

- A flaw in the 'boot_config.jsp' script that cross-site
scripting due to the improper validation of
user-supplied input. An attacker can exploit this issue
to execute code in the security context of a user's
browser to steal authentication cookies. (CVE-2014-0952)

- An unspecified cross-site scripting vulnerability due to
improper user input validation by a JSP script. An
attacker can exploit this issue to execute code in the
security context of a user's web browser to steal
authentication cookies. (CVE-2014-0956)

- An unspecified vulnerability exists that allows an
authenticated attacker to execute arbitrary code on the
system. (CVE-2014-4808)

- A flaw exists that is caused by improper recursion
detection during entity expansion. By tricking a user
into opening a specially-crafted XML document, an
attacker can cause the system to crash, resulting in a
denial of service. (CVE-2014-4814)

- An information disclosure vulnerability that allows a
remote attacker to identify whether or not a file exists
based on the webserver error codes. (CVE-2014-4821)

See also :

https://www-304.ibm.com/support/docview.wss?uid=swg21684651
http://www.nessus.org/u?2e77e115
https://www-01.ibm.com/support/docview.wss?uid=swg21672572

Solution :

IBM has published a cumulative fix (CF27) for WebSphere Portal
6.1.0.6. Refer to IBM's advisory for more information.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

phpMyAdmin 4.0.x < 4.0.10.5 / 4.1.x < 4.1.14.6 / 4.2.x < 4.2.10.1 Multiple XSS (PMASA-2014-12)


Synopsis:

The remote web server hosts a PHP application that is affected by
multiple vulnerabilities.

Description:

According to its self-reported version number, the phpMyAdmin
application hosted on the remote web server is 4.0.x prior to
4.0.10.5, 4.1.x prior to 4.1.14.6, or 4.2.x prior to 4.2.10.1. It is,
therefore, affected by the following cross-site scripting
vulnerabilities :

- The 'libraries/DatabaseInterface.class.php' script does
not validate input to database and table names in SQL
debug output before returning it to users.

- The 'js/server_status_monitor.js' script does not
validate input to executed queries before they are
viewed or analyzed.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

http://www.phpmyadmin.net/home_page/security/PMASA-2014-12.php
http://www.nessus.org/u?1b0b4c16
http://www.nessus.org/u?58e25324
http://www.nessus.org/u?d6d9753b
http://www.nessus.org/u?4d81aa0b
http://www.nessus.org/u?0465513c
http://www.nessus.org/u?63d6d946

Solution :

Upgrade to phpMyAdmin 4.0.10.5 / 4.1.14.6 / 4.2.10.1 or later, or
apply the patches from the referenced links.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVSS Temporal Score : 3.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Cisco Email Security Appliance ZIP File Filter Bypass


Synopsis:

The remote appliance is affected by a security bypass vulnerability.

Description:

According to its self-reported version, the Cisco Email Security
Appliance is affected by a security bypass vulnerability in which the
ZIP inspection engine of AsyncOS does not properly analyze files, thus
allowing a remote, unauthenticated attacker to deliver malicious
content by using a specially crafted ZIP file.

See also :

http://tools.cisco.com/security/center/viewAlert.x?alertId=36062
http://www.nessus.org/u?5468c8c6

Solution :

Contact the vendor regarding a fix for Cisco bug ID CSCup07934.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

RHEL 4 / 5 / 6 : JBoss EWP (RHSA-2014:1728)


Synopsis:

The remote Red Hat host is missing a security update.

Description:

Updated packages for Red Hat JBoss Enterprise Web Platform 5.2.0 that
fix one security issue are now available for Red Hat Enterprise Linux
4, 5, and 6.

Red Hat Product Security has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Red Hat JBoss Enterprise Web Platform is a platform for Java
applications, which integrates the JBoss Web Server with JBoss
Hibernate and JBoss Seam.

It was discovered that the Apache Santuario XML Security for Java
project allowed Document Type Definitions (DTDs) to be processed when
applying Transforms even when secure validation was enabled. A remote
attacker could use this flaw to exhaust all available memory on the
system, causing a denial of service. (CVE-2013-4517)

All users of Red Hat JBoss Enterprise Web Platform 5.2.0 on Red Hat
Enterprise Linux 4, 5, and 6 are advised to upgrade to these updated
packages. The JBoss server process must be restarted for the update to
take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2013-4517.html
http://rhn.redhat.com/errata/RHSA-2014-1728.html

Solution :

Update the affected xml-security package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

RHEL 4 / 5 / 6 : JBoss EAP (RHSA-2014:1726)


Synopsis:

The remote Red Hat host is missing a security update.

Description:

Updated packages for Red Hat JBoss Enterprise Application Platform
5.2.0 that fix one security issue are now available for Red Hat
Enterprise Linux 4, 5, and 6.

Red Hat Product Security has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications, which integrates the JBoss Application Server with JBoss
Hibernate and JBoss Seam.

It was discovered that the Apache Santuario XML Security for Java
project allowed Document Type Definitions (DTDs) to be processed when
applying Transforms even when secure validation was enabled. A remote
attacker could use this flaw to exhaust all available memory on the
system, causing a denial of service. (CVE-2013-4517)

All users of Red Hat JBoss Enterprise Application Platform 5.2.0 on
Red Hat Enterprise Linux 4, 5, and 6 are advised to upgrade to these
updated packages. The JBoss server process must be restarted for the
update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2013-4517.html
http://rhn.redhat.com/errata/RHSA-2014-1726.html

Solution :

Update the affected xml-security package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

openSUSE Security Update : libxml2 (openSUSE-SU-2014:1330-1)


Synopsis:

The remote openSUSE host is missing a security update.

Description:

This update fixes a denial of service vulnerability when expanding
recursive entity (CVE-2014-3660) bnc#901546

See also :

http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
https://bugzilla.opensuse.org/show_bug.cgi?id=901546

Solution :

Update the affected libxml2 packages.

Risk factor :

Medium

This script is Copyright (C) 2014 Tenable Network Security, Inc.

openSUSE Security Update : openssl (openSUSE-SU-2014:1331-1)


Synopsis:

The remote openSUSE host is missing a security update.

Description:

The following issues were fixed in this release :

CVE-2014-3566: SSLv3 POODLE attack (bnc#901223) CVE-2014-3513,
CVE-2014-3567: DTLS memory leak and session ticket memory leak

See also :

http://lists.opensuse.org/opensuse-updates/2014-10/msg00035.html
https://bugzilla.opensuse.org/show_bug.cgi?id=901223
https://bugzilla.opensuse.org/show_bug.cgi?id=901277

Solution :

Update the affected openssl packages.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Mandriva Linux Security Advisory : wget (MDVSA-2014:212)


Synopsis:

The remote Mandriva Linux host is missing a security update.

Description:

Updated wget package fixes security vulnerability :

Wget was susceptible to a symlink attack which could create arbitrary
files, directories or symbolic links and set their permissions when
retrieving a directory recursively through FTP (CVE-2014-4877).

The default settings in wget have been changed such that wget no
longer creates local symbolic links, but rather traverses them and
retrieves the pointed-to file in such a retrieval. The old behaviour
can be attained by passing the --retr-symlinks=no option to the wget
command.

See also :

http://advisories.mageia.org/MGASA-2014-0431.html

Solution :

Update the affected wget package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Mandriva Linux Security Advisory : wpa_supplicant (MDVSA-2014:211)


Synopsis:

The remote Mandriva Linux host is missing a security update.

Description:

Updated wpa_supplicant packages fix security vulnerability :

A vulnerability was found in the mechanism wpa_cli and hostapd_cli use
for executing action scripts. An unsanitized string received from a
remote device can be passed to a system() call resulting in arbitrary
command execution under the privileges of the wpa_cli/hostapd_cli
process (which may be root in common use cases) (CVE-2014-3686).

Using the wpa_supplicant package, systems are exposed to the
vulnerability if operating as a WPS registrar.

See also :

http://advisories.mageia.org/MGASA-2014-0429.html

Solution :

Update the affected wpa_supplicant package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.

FreeBSD : libssh -- PRNG state reuse on forking servers (f8c88d50-5fb3-11e4-81bd-5453ed2e2b49)


Synopsis:

The remote FreeBSD host is missing a security-related update.

Description:

Aris Adamantiadis reports :

When accepting a new connection, the server forks and the child
process handles the request. The RAND_bytes() function of openssl
doesn't reset its state after the fork, but simply adds the current
process id (getpid) to the PRNG state, which is not guaranteed to be
unique.

See also :

http://www.openwall.com/lists/oss-security/2014/03/05/1
http://www.nessus.org/u?383e8e32

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 1.9
(CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 20 : seamonkey-2.30-1.fc20 (2014-13780)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Update to 2.30

Fixes various security issues, see
http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
for more info.

See also :

http://www.mozilla.org/security/known-vulnerabilities/seamonkey.html
https://bugzilla.redhat.com/show_bug.cgi?id=1154003
http://www.nessus.org/u?1697de70

Solution :

Update the affected seamonkey package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 20 : file-5.19-7.fc20 (2014-13571)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Security fix for CVE-2014-3710

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=1155071
http://www.nessus.org/u?8ef5d049

Solution :

Update the affected file package.

Risk factor :

High

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 20 : wpa_supplicant-2.0-12.fc20 (2014-13555)


Synopsis:

The remote Fedora host is missing a security update.

Description:

This update fixes a possible security issue executing scripts with
wpa_cli.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=1151259
http://www.nessus.org/u?3f93272f

Solution :

Update the affected wpa_supplicant package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Fedora 20 : webkitgtk3-2.2.8-2.fc20 (2014-13444)


Synopsis:

The remote Fedora host is missing a security update.

Description:

Disable the SSLv3 to address the POODLE vulnerability

See also :

http://www.nessus.org/u?205a27a4

Solution :

Update the affected webkitgtk3 package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

This script is Copyright (C) 2014 Tenable Network Security, Inc.