27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

unauthenticated attacker can exploit these flaws to manipulate database queries, which may<br />

lead to disclosure of sensitive information, modification of data or attacks against the<br />

underlying database.<br />

Solution: Upgrade to a version of higher than 0.7.20070307.<br />

CVE-2007-3183<br />

WordPress < 2.2.1 _wp_attached_file Metadata Unrestricted File Upload<br />

<strong>PVS</strong> ID: 4114 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe version of<br />

WordPress installed on the remote host is vulnerable to a file upload attack. An attacker<br />

exploiting this flaw would only need to be able to send custom queries to the 'wp-app.php'<br />

or 'app.php' script. Successful exploitation would result in the attacker uploading arbitrary<br />

code that could then be executed with the privileges of the web server. The path to the<br />

vulnerable version of WordPress is:\n%P<br />

Solution: Upgrade to version 2.2.1 or higher.<br />

CVE-2007-3543<br />

Ingres Communications Server Detection<br />

<strong>PVS</strong> ID: 4115 FAMILY: Database RISK: INFO NESSUS ID:25572<br />

Description: Synopsis :\n\nA database service is listening on the remote host.\n\n The remote service is<br />

an Ingres Communications Server, also known as a Net Server. This is the main process<br />

component of Ingres Net and monitors communications between applications and DBMS<br />

servers.<br />

Solution: Limit incoming traffic to this port if desired.<br />

CVE Not available<br />

TrendMicro OfficeScan < 8.0.0.1042 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4116 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a TrendMicro OfficeScan server. This version is reported to be vulnerable to<br />

multiple flaws. The more serious of these flaws involves a buffer overflow. An attacker<br />

exploiting these flaws would be able to execute arbitrary code on the remote OfficeScan<br />

server.<br />

Solution: Upgrade to version 8.0.0.1042 or higher.<br />

CVE-2007-3454<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1068

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!