27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Geeklog <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3900 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

running Geeklog, an open-source weblog powered by PHP and MySQL. The version of<br />

Geeklog installed on the remote host includes a flaw in the way that it parses user-supplied<br />

data. Specifically, the 'glConf' parameter of the 'BaseView.php' script can be used by a<br />

remote attacker to upload and execute arbitrary script code. An attacker exploiting this flaw<br />

would be able to execute code with the permissions of the web server process.<br />

Solution: Upgrade to a version higher than 2.0.<br />

CVE-2007-0810<br />

PostgreSQL Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3901 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PostgreSQL, an open source relational database. This version is vulnerable to<br />

multiple flaws where an attacker with a valid user account can cause the service to stop or<br />

potentially disclose confidential information. Successful exploitation would result in the<br />

system being unavailable to legitimate users or the leakage of confidential data.<br />

Solution: Upgrade to version 7.3.16, 7.4.16, 8.0.11, 8.1.7, 8.2.2 or higher.<br />

CVE-2007-0556<br />

WinProxy < 6.1 R1c HTTP CONNECT Request Overflow<br />

<strong>PVS</strong> ID: 3902 FAMILY: FTP Servers RISK: HIGH NESSUS ID:24277<br />

Description: Synopsis :\n\nThe remote HTTP proxy is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running WinProxy, a proxy server for Windows. The<br />

version of WinProxy installed on the remote host reportedly contains a design issue that<br />

may result in a buffer overflow vulnerability. Using a specially-crafted HTTP CONNECT<br />

request, a remote attacker may be able to leverage this issue to execute arbitrary code on<br />

the affected host subject to the privileges under which the service runs.<br />

Solution: Upgrade to version 6.1 R1c or higher.<br />

Firefox <<br />

CVE-2007-0796<br />

<strong>PVS</strong> ID: 3903 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1010

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!