27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3860 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:23835<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the email<br />

client.\n\nThe remote host is running a version of Microsoft Outlook Express that contains<br />

a security flaw that may allow an attacker to execute arbitrary code on the remote host. To<br />

exploit this flaw, an attacker would need to send a malformed HTML email to a victim on<br />

the remote host and have them open it.<br />

Solution: Microsoft has released a set of patches for Outlook Express at<br />

http://www.microsoft.com/technet/security/bulletin/ms06-076.mspx<br />

CVE-2006-2386<br />

FileZilla Server < 0.9.22 Multiple Remote DoS<br />

<strong>PVS</strong> ID: 3861 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:23831<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its version, the FileZilla Server Interface installed on the remote<br />

host is affected by several denial of service flaws that could be leveraged by an<br />

authenticated attacker to crash the server and deny service to legitimate users.<br />

Solution: Upgrade to version 0.9.22 or higher.<br />

CVE Not available<br />

JBoss JMX Console DeploymentFileRepository Directory Traversal File Manipulation<br />

<strong>PVS</strong> ID: 3862 FAMILY: CGI RISK: HIGH NESSUS ID:23843<br />

Description: The remote web server contains a Java service that is affected by a directory traversal flaw.<br />

The remote web server appears to be a version of JBoss that fails to sanitize user-supplied<br />

input to the BaseDir parameter used by the 'DeploymentFileRepository' service of JMX<br />

Console before using it to store or delete files. An unauthenticated attacker may be able to<br />

exploit this to alter files on the remote host subject to the privileges of the JBoss user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5750<br />

CA Antivirus Client Detection<br />

<strong>PVS</strong> ID: 3863 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a CA antivirus client.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 999

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!