27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2007-3910<br />

LinPHA include/img_view.class.php < 1.3.2 order Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4150 FAMILY: CGI RISK: HIGH NESSUS ID:25811<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is prone to a SQL injection<br />

attack.\n\n The remote host is running LinPHA, a web photo gallery application written in<br />

PHP. The version of LinPHA installed on the remote host fails to sanitize input to the<br />

'order' parameter of the 'new_images.php' script before using it in the 'setSql' function in<br />

'include/img_view.class.php' in a database query. Regardless of PHP's 'magic_quotes_gpc'<br />

setting, an unauthenticated attacker may be able to exploit this issue to manipulate such<br />

queries, leading to disclosure of sensitive information, modification of data or attacks<br />

against the underlying database.<br />

Solution: Upgrade to version 1.3.2 or higher.<br />

CVE-2007-4053<br />

Firefox < 2.0.0.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4151 FAMILY: Web Clients RISK: HIGH NESSUS ID:25820<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\nThe installed version of Firefox allows unescaped URIs to be<br />

passed to external programs, may lead to execution of arbitrary code on the affected host<br />

subject to the user's privileges, and could also allow privilege escalation attacks against<br />

addons that create 'about:blank' windows and populate them in certain ways.<br />

Solution: Upgrade to version 2.0.0.6 or higher.<br />

CVE-2007-3844<br />

Mozilla Thunderbird < 1.5.0.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4152 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote<br />

version of Mozilla Thunderbird suffers from a flaw in the way that it handles 'about:blank'<br />

Javascript code. An attacker exploiting this flaw would need to be able to convince a<br />

Thunderbird user to open an email that populated 'about:blank' with malicious Javascript<br />

code. Successful exploitation would result in the attacker executing arbitrary Javascript on<br />

the local machine.<br />

Solution: Upgrade to version 1.5.0.13 or higher.<br />

CVE-2007-3844<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1078

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!