27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote database server is susceptible to multiple attacks.\n\nThe version<br />

of MySQL installed on the remote host is reportedly affected by a denial of service<br />

vulnerability that can lead to a server crash with a specially-crafted password packet. It is<br />

also affected by a privilege escalation vulnerability because 'CREATE TABLE LIKE' does<br />

not require any privileges on the source table, which allows an attacker to create arbitrary<br />

tables using the affected application.<br />

Solution: Upgrade to version 5.0.45 or higher.<br />

CVE-2007-3782<br />

ISC BIND < 9.5.0a6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4147 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BIND DNS Server prior to 9.4.1-P1. This version of BIND is<br />

vulnerable to a number of flaws that would allow cache poisoning and Denial of Service<br />

(DoS) attacks. An attacker exploiting these flaws would need to be able to manipulate the<br />

vulnerable DNS server to contact a malicious DNS server. Successful exploitation would<br />

lead to cache-poisoning attacks or a loss of availability.<br />

Solution: Upgrade to version 9.5.0a6 or higher.<br />

CVE-2007-2926<br />

Kerio MailServer < 6.4.1 Attachment Filter Unspecified Issue<br />

<strong>PVS</strong> ID: 4148 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an unspecified vulnerability in its filtering<br />

mechanism.\n\nThe remote host is running Kerio MailServer version 6.4.0 or lower. There<br />

is a flaw in the remote version of this server. The details of the flaw are currently unknown;<br />

however, it is alleged that the flaw would lead to remote compromise.<br />

Solution: Upgrade to version 6.4.1 or higher.<br />

Bandersnatch <<br />

CVE-2007-3993<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4149 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running Bandersnatch, an open-source PHP application that generates Jabber<br />

usage statistics. This version of Bandersnatch is vulnerable to a flaw in the way that it<br />

parses multiple user-supplied variables. An attacker exploiting these flaws can inject script<br />

and SQL code that would be executed on the server with the permissions of the web server.<br />

Family Internet Services 1077

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!