27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Tivoli Client Detection<br />

<strong>PVS</strong> ID: 3979 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Tivoli client. The reported version was: \n %L<br />

Solution: N/A<br />

Tivoli Server Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 3980 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Tivoli Server. The reported version was: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Mambo < 4.6.2 includes/pdf.php dofreePDF Function Authentication Bypass<br />

<strong>PVS</strong> ID: 3981 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running the Mambo Content<br />

Server, an application for generating dynamic content for web servers. The<br />

remote application is vulnerable to a flaw where remote attackers can gain<br />

access to the data hosted on the Mambo database. The root of the flaw stems<br />

from a lack of authentication and authorization by the 'pdf.php' application. In<br />

order to exploit this flaw, an attacker would only need to be able to send data to<br />

the 'pdf.php' application. Successful exploitation would result in a potential loss<br />

of confidentiality, integrity, and availability on the remote database server.<br />

Solution: Upgrade to version 4.6.2 or higher.<br />

CVE-2006-7202<br />

PHP < 4.4.7 / 5.2.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3982 FAMILY: Web Servers RISK: HIGH NESSUS ID:25159<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP lower than 4.4.7 or 5.2.2. This version is vulnerable to a<br />

number of remote issues. At least one of these issues is related to a buffer overflow attack.<br />

An attacker exploiting these flaws would be able to impact confidentiality, integrity, and<br />

availability. The reported version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.7, 5.2.2 or higher.<br />

CVE-2007-1001<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1032

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!