27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SQLiX SQL Injection Tool Detection<br />

<strong>PVS</strong> ID: 3914 FAMILY: Policy<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running SQLix. SQLix is a tool that automates the<br />

detection and exploitation of web applications that are vulnerable to SQL injection attacks.<br />

Solution: Ensure that this application is authorized by corporate policies and guidelines.<br />

CVE Not available<br />

Microsoft FrontPage Version Detection<br />

<strong>PVS</strong> ID: 3915 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote web server appears to be running with FrontPage extensions. Double-check the<br />

configuration since many problems have been found with FrontPage when the<br />

configuration has not been secured. The reported version of FrontPage is: \n %L<br />

Solution: If it is not required, disable FrontPage access. Otherwise, disable anonymous access to the<br />

resource.<br />

CVE Not available<br />

LifeType < 1.1.6 rss.php profile Parameter Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3916 FAMILY: Web Servers RISK: NONE NESSUS ID:24356<br />

Description: Synopsis :\n\nThe remote host may allow remote disclosure of confidential files.\n\nThe<br />

remote host is running LifeType, an open-source blogging platform. The version of<br />

LifeType installed on the remote fails to sanitize input to the 'profile' parameter of the<br />

'rss.php' script of directory traversal sequences. An unauthenticated remote attacker can<br />

leverage this flaw to read files on the affected host and disclose sensitive information, such<br />

as configuration parameters used by the application.<br />

Solution: Upgrade to version 1.1.6, 1.2-beta2 or higher.<br />

CVE-2007-0979<br />

ClamAV < 0.90.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3917 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running the ClamAV antivirus client version %L\n\nThis version of<br />

ClamAV is vulnerable to a flaw where a CAB file with a reported length of zero<br />

can cause ClamAV to crash. In addition, the ClamAV application is vulnerable to a<br />

directory traversal flaw. An attacker, by specifying a file name which has '../' or '..\'<br />

Family Internet Services 1014

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!