27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Ensure that such scanning is in alignment with corporate policies and guidelines.<br />

CVE Not available<br />

Lotus Domino IMAP Server < 6.5.6 / 7.0.2 FP1 CRAM-MD5 Authentication Overflow<br />

<strong>PVS</strong> ID: 3958 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:24903<br />

Description: Synopsis : \n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe IMAP server component of IBM Lotus Domino Server installed on<br />

the remote host fails to check the length of the supplied username in its CRAM-MD5<br />

authentication mechanism before processing it. By supplying a username over 256 bytes,<br />

an unauthenticated remote attacker can leverage this issue to crash the affected service and<br />

possibly execute arbitrary code remotely. The reported version (via banner) of the affected<br />

application is: \n %L<br />

Solution: Upgrade to version 6.5.6, 7.0.2 FP1 or higher.<br />

CVE-2007-1675<br />

WordPress < 2.1.3 xmlrpc.php mt.setPostCategories Method SQL Injection<br />

<strong>PVS</strong> ID: 3959 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

WordPress installed on the remote host is vulnerable to a SQL injection attack. The<br />

reported version is: \n %L \n\nAn attacker exploiting this flaw would need to have the<br />

ability to authenticate to WordPress. Upon authentication, the attacker would send a<br />

malformed query that, when processed, would execute arbitrary SQL commands on the<br />

WordPress database. The path to the affected application is: \n%P<br />

Solution: Upgrade to version 2.1.3 or higher and overwrite all the old files, especially those in<br />

wp-includes.<br />

CVE-2007-1897<br />

F-Secure Product Detection<br />

<strong>PVS</strong> ID: 3960 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running F-Secure, a firewall and antivirus software package.<br />

Solution: N/A<br />

CVE Not available<br />

F-Secure Product Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3961 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1026

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!