27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote Windows host has a program that allows arbitrary file<br />

access.\n\n According to its version, the installation of WinSCP on the remote host fails to<br />

completely sanitize input to the SCP and SFTP protocol handlers. If an attacker can trick a<br />

user on the affected host into clicking on a malicious link, he may be able to initiate a file<br />

transfer to or from the affected host. The reported version of WinSCP is: \n %L<br />

Solution: Upgrade to version 4.0.4 or higher.<br />

CVE-2007-4909<br />

AOL Instant Messenger <<br />

<strong>PVS</strong> ID: 4215 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote<br />

client is running AOL Instant Messenger version: %L\nThis version of AIM is vulnerable<br />

to a flaw where script code can be injected and executed by a malicious user. To exploit<br />

this flaw, an attacker would only need to be able to send a message to an unsuspecting user.<br />

Successful exploitation would result in the attacker executing arbitrary script code.<br />

Solution: Upgrade to a version higher than 6.1.41.2.<br />

CVE-2007-4901<br />

OpenOffice < 2.3 TIFF Parser Multiple Overflows<br />

<strong>PVS</strong> ID: 4216 FAMILY: Generic RISK: HIGH NESSUS ID:26064<br />

Description: The remote Windows host has a program that is affected by multiple buffer overflow<br />

vulnerabilities. The remote host is running a version of OpenOffice.org that is affected by<br />

multiple integer overflows in its TIFF document parser that can be triggered when parsing<br />

tags in TIFF directory entries. If a remote attacker can trick a user into opening a<br />

specially-crafted TIFF document, he may be able to leverage this issue to execute arbitrary<br />

code on the remote host subject to the user's privileges.<br />

Solution: Upgrade to version 2.3 or higher.<br />

CVE-2007-2834<br />

Merak Mail < 9.0.0 BODY Element HTML Injection<br />

<strong>PVS</strong> ID: 4217 FAMILY: SMTP Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThere is a<br />

flaw in this version of Merak mail server. Specifically, the application fails to filter out<br />

dangerous script input to email. An attacker may be able to execute arbitrary code when the<br />

user accesses Merak via the webmail interface. Successful exploitation would result in the<br />

attacker executing code in the remote client browser.<br />

Family Internet Services 1096

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!