27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Snitz Forum < 3.4.0.07 active.asp BuildTime Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4306 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

appears to be running Snitz Forum, a web forum application implemented in ASP. This<br />

version of Snitz ('%L') is reported to be vulnerable to a SQL injection flaw within the<br />

'active.asp' script. An attacker exploiting this flaw would send specially formed HTTP<br />

queries to the active.asp script. These queries would include SQL statements that would<br />

ultimately be executed on the database utilized by Snitz.<br />

Solution: Upgrade to version 3.4.0.07 or higher.<br />

CVE-2007-6240<br />

Jetty < 6.1.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4307 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Jetty (version: '%L'), a Java web server that can be downloaded off the Internet<br />

and is currently bundled with some IBM applications. This version of Jetty is vulnerable to<br />

a remote flaw in the way that it handles cookie quotes. An attacker exploiting this flaw<br />

would be able to hijack the session of valid users without authentication. Further, this<br />

version of Jetty is vulnerable to a flaw in the way that it handles Carriage-Return/Line-Feed<br />

characters. An attacker can exploit this flaw to inject malicious HTTP headers into a<br />

session. This version of Jetty is also vulnerable to a cross-site scripting (XSS) attack that<br />

would allow an attacker to possibly retrieve sensitive data from client browsers.<br />

Solution: Upgrade to version 6.1.6 or higher.<br />

CVE-2007-5614<br />

OpenOffice HSQLDB Document Handling Java Code Injection<br />

<strong>PVS</strong> ID: 4308 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running a version of OpenOffice.org that is affected by a remote code execution flaw.<br />

The root of the flaw appears to be the HSQLDB database engine. An attacker exploiting<br />

this flaw would need to be able to convince a user to open a file that was handled by the<br />

OpenOffice HSQLDB database engine. Successful exploitation would result in the attacker<br />

executing arbitrary Java code on the remote system.<br />

Solution: Upgrade to version 2.3.1 (2.3 build 9238) or higher.<br />

CVE-2007-4575<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MySQL < 5.0.51 RENAME TABLE Symlink System Table Overwrite<br />

<strong>PVS</strong> ID: 4309 FAMILY: Database RISK: LOW NESSUS ID:29251<br />

Family Internet Services 1121

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!