27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Google Urchin web application. The<br />

reported version is '%L'\nThis version of Urchin is reported prone to a flaw where an<br />

attacker can gain administrative access to the application. The 'report.cgi' script fails to<br />

adequately verify that the user is authorized. An attacker exploiting this flaw would be able<br />

to perform some subset of administrative duties without authentication.<br />

Solution: Upgrade to a version of Urchin higher than 5.7.03.<br />

CVE-2007-5113<br />

Winamp < 5.5 libFLAC Integer Overflow<br />

<strong>PVS</strong> ID: 4243 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Winamp, a multi-media software application. This version of Winamp includes a<br />

library that is reported to be prone to a remote integer overflow. An attacker exploiting this<br />

flaw would need to be able to convince a Winamp user to open a file with malformed<br />

FLAC data. Successful exploitation would result in the attacker executing arbitrary code on<br />

the remote client system.<br />

Solution: Upgrade to version 5.5 or higher.<br />

CVE-2007-4619<br />

Avocent KVM Appliance Detection<br />

<strong>PVS</strong> ID: 4244 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running an Avocent Enterprise KVM appliance. This appliance<br />

allows remote users to manage their network servers remotely.<br />

Solution: N/A<br />

CVE Not available<br />

Apache Tomcat < 6.0.15 WEBDAV Lock Request Information Disclosure<br />

<strong>PVS</strong> ID: 4245 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can be manipulated to disclose confidential<br />

data.\n\nThe remote host is running a version of Tomcat server less than 6.0.15. This<br />

version of Tomcat is vulnerable to a flaw in the way that it parses WEBDAV 'lock'<br />

requests. Specifically, if the lock request references an external file, Tomcat will<br />

retrieve the file. This could lead to information disclosure of potentially confidential<br />

data. An attacker exploiting this flaw would need to have the ability to authenticate<br />

to the Tomcat server.<br />

Solution: Upgrade to version 6.0.15 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1104

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!