27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RunCMS < 1.5.2 Build 20070504 SQL Injection<br />

<strong>PVS</strong> ID: 3983 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running RunCMS, a web-based content management and messaging system. This version<br />

of RunCMS is vulnerable to a remote SQL injection flaw. Flaws within the SQL-handling<br />

routines of the 'debug_show.php' script are the root cause of this vulnerability. An attacker<br />

exploiting this flaw would only need to be able to send specially crafted queries to the<br />

'debug_show.php' script. Successful exploitation would result in the attacker being able to<br />

execute arbitrary SQL commands on the remote database server.<br />

Solution: Upgrade to version 1.5.2 Build 20070504 or higher.<br />

CVE-2007-2539<br />

Cubecart < 3.0.16 HTTP Response Splitting<br />

<strong>PVS</strong> ID: 3984 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTTP 'response splitting' attack.\n\nThe<br />

version of CubeCart installed on the remote host fails to properly sanitize user-supplied<br />

input to the 'ccUser' parameter before using it in cart.php and index.php. An<br />

unauthenticated remote attacker may be able to exploit this issue to insert false HTTP<br />

header data into the client request.<br />

Solution: Upgrade to version 3.0.16 or higher.<br />

CVE-2007-2550<br />

MySQL < 5.0.40 IF Query NULL Dereference DoS<br />

<strong>PVS</strong> ID: 3985 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:25198<br />

Description: Synopsis :\n\nThe remote database server is prone to a denial of service attack.\n\nThe<br />

version of MySQL installed on the remote host is reportedly affected by a denial of service<br />

vulnerability that may be triggered with a specially crafted IF query. An attacker who can<br />

execute arbitrary SELECT statements may be able to leverage this issue to crash the<br />

affected service.<br />

Solution: Upgrade to version 5.0.40 or higher.<br />

CVE-2007-2583<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SNORT Intrusion Detection System (IDS) Detection<br />

<strong>PVS</strong> ID: 3986 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1033

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!