27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 7.0.302.000 or higher.<br />

CVE-2007-2467<br />

Lighttpd < 1.4.14 Multiple DoS<br />

<strong>PVS</strong> ID: 3969 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Lighttpd, a small web server. This version of Lighttpd is vulnerable<br />

to multiple Denial of Service (DoS) flaws. An attacker exploiting these flaws would only<br />

need to be able to send data to the web server. Successful exploitation would result in the<br />

attacker crashing the web server.<br />

Solution: Upgrade to version 1.4.14 or higher.<br />

CVE-2007-1869<br />

ProFTPD < 1.3.0rc4 Multiple Modules Authentication Bypass<br />

<strong>PVS</strong> ID: 3970 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is using ProFTPD, a free FTP server for Unix and<br />

Linux. According to its banner, the version of ProFTPD installed on the remote host suffers<br />

from a flaw where a user can bypass access controls. An attacker exploiting this flaw would<br />

need the ability to authenticate to the server. Successful exploitation would result in the<br />

attacker elevating privileges or accessing confidential data. The observed banner was: \n<br />

%L<br />

Solution: Upgrade to version 1.3.0rc4 or higher.<br />

CVE-2007-2165<br />

GroupWise < 7.0.0 SP2 WebAccess GWINTER.exe Base64 Decoding Overflow<br />

<strong>PVS</strong> ID: 3971 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of GroupWise WebAccess from Novell that fails to sanitize HTTP<br />

authentication requests. An overly long request will generate an overflow on the remote<br />

WebAccess server. An attacker exploiting this flaw would only need to be able to connect<br />

to the service and send an HTTP basic authentication request. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 7.0.0 SP2 or higher.<br />

CVE-2007-2171<br />

Tivoli Provisioning Manager Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1029

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!