27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVSTrac < 2.0.1 Text Output Formatter DoS<br />

<strong>PVS</strong> ID: 3896 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:24263<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script or is itself subject to a denial of<br />

service attack.\n\nAccording to its version number, the version of CVSTrac installed on the<br />

remote host contains a flaw related to its Wiki-style text output formatter that may allow an<br />

attacker to cause a partial denial of service, depending on the pages requested.<br />

Solution: Upgrade to version 2.0.1 or higher.<br />

CVE-2007-0347<br />

WebGUI < 7.3.8 www_purgeList Method Asset Deletion<br />

<strong>PVS</strong> ID: 3897 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to a flaw where an attacker can bypass<br />

security restrictions and gain administrative access to the application. Specifically, the<br />

'www_purgeList()' function fails to validate user credentials and would allow an<br />

unauthenticated user to delete application assets.<br />

Solution: Upgrade to version 7.3.8 or higher.<br />

CVE-2007-0629<br />

Phorum < 5.1.19 register.php XSS<br />

<strong>PVS</strong> ID: 3898 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote version of Phorum contains a script called 'register.php' that is vulnerable to a<br />

cross-site scripting attack via the 'username' parameter. An attacker may exploit this<br />

problem to steal the authentication credentials of third party users.<br />

Solution: Upgrade to version 5.1.19 or higher.<br />

CVE-2007-0769<br />

Policy - Nintendo Wii Detection<br />

<strong>PVS</strong> ID: 3899 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Nintendo Wii gaming station.<br />

Solution: Ensure that the device is authorized.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1009

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!