27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4095 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is a Windows CE device. The remote client OS is \n%L\n\nThis version of Windows CE<br />

has been reported prone to a number of Denial of Service (DoS) attacks. In addition, the<br />

client is reported vulnerable to a buffer overflow. An attacker exploiting these flaws would<br />

be able to either crash the client or execute arbitrary code.<br />

Solution: Upgrade to version 5.1 or higher.<br />

CVE Not available<br />

Windows CE < 5.0 / 6.0 Buffer Overflow<br />

<strong>PVS</strong> ID: 4096 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is a<br />

Windows CE device. The remote client OS is \n%L\n\nThis version of Windows CE has<br />

been reported prone to a buffer overflow. An attacker exploiting this flaw would be able to<br />

execute arbitrary code on the remote device.<br />

Solution: Upgrade to version 5.0, 6.0 or higher.<br />

YaBB SE <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4097 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running the YaBB SE forum<br />

management system. There is a flaw in this version of YaBB SE that allows<br />

authenticated users to escalate privileges and gain administrative access. The<br />

'Profile.pl' and 'Register.pl' scripts fails to sanitize CRLF sequences. An attacker<br />

can use this flaw to write data into their profile which gives them elevated<br />

access.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3295<br />

IMAP User ID Enumeration<br />

<strong>PVS</strong> ID: 4098 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an IMAP client. The observed IMAP User ID was\n%L"<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1063

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!