27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote server is running Microsoft Outlook Web Access (OWA) version : '%P'<br />

Solution: Ensure that this instance of Outlook Web Access is within corporate standards and is<br />

fully patched.<br />

CVE Not available<br />

RunCMS include/common.php xoopsOption Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 4295 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:28291<br />

Description: The remote web server contains a PHP application that is susceptible to a local file<br />

inclusion attack. The remote host appears to be running RunCMS, a content-management<br />

system written in PHP. The version of RunCMS installed on the remote host fails to<br />

sanitize user input to the 'xoopsOption[pagetype]' parameter before using it to include PHP<br />

code in 'include/common.php'. Regardless of PHP's 'register_globals' setting, an<br />

unauthenticated remote attacker may be able to exploit this issue to view arbitrary files or<br />

to execute arbitrary PHP code on the remote host, subject to the privileges of the web<br />

server user ID.<br />

Solution: No solution is known at this time.<br />

CVE-2008-0224<br />

Firefox < 2.0.0.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4296 FAMILY: Web Clients RISK: HIGH NESSUS ID:28329<br />

Description: Synopsis :\n\nThe remote Windows host contains a web browser that is affected by<br />

multiple vulnerabilities.\n\n The installed version of Firefox is affected by various security<br />

issues :\n\n - Three bugs that can result in crashes with traces of memory corruption\n - A<br />

cross-site scripting vulnerability involving support for the 'jar:' URI scheme\n - A timing<br />

issue when setting the 'window.location' property that could be leveraged to conduct<br />

cross-site request forgery attacks.<br />

Solution: Upgrade to version 2.0.0.10 or higher.<br />

CVE-2007-5960<br />

Sentinel Protection Server < 7.4.1 Directory Traversal File Access<br />

<strong>PVS</strong> ID: 4297 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running a the Sentinel Protection Server version %L.\nThis version of Sentinel is<br />

vulnerable to a flaw where specially formatted HTTP requests, like 'GET<br />

/..\..\..\..\..\..\winnt\win.ini', will cause the server to return potentially confidential data from<br />

outside of the web directories.<br />

Family Internet Services 1118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!