27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'privilege escalation' flaw.\n\nThe<br />

remote host is running WebGUI, a content management framework. The remote version of<br />

this software is vulnerable to a flaw where an authenticated 'secondary admin' user can<br />

bypass security restrictions and gain administrative ability to add and modify user accounts.<br />

This would include the ability to create administrative accounts. An attacker exploiting this<br />

flaw would need a valid 'secondary admin' account.<br />

Solution: Upgrade to version 7.4.18 or higher.<br />

CVE Not available<br />

LDAP Client Anonymous Bind Utilization<br />

<strong>PVS</strong> ID: 4316 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an LDAP client. Improperly configured LDAP servers will allow any<br />

user to connect to the server and query for information. <strong>PVS</strong> has noted a client that utilized<br />

a NULL LDAP bind request.<br />

Solution: Ensure that such usage is in line with corporate policies regarding authentication and<br />

authorization.<br />

CVE Not available<br />

LDAP Client Anonymous Bind Utilization<br />

<strong>PVS</strong> ID: 4317 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is an LDAP client. Improperly configured LDAP servers will allow any<br />

user to connect to the server and query for information. <strong>PVS</strong> has noted a client that utilized<br />

a NULL LDAP bind request.<br />

Solution: Ensure that such usage is in line with corporate policies regarding authentication and<br />

authorization.<br />

CVE Not available<br />

PeerCast < 0.1218 servhs.cpp handShakeHTTP Function Remote Overflow<br />

<strong>PVS</strong> ID: 4318 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server suffers from a buffer overflow vulnerability.\n\nThe<br />

version of PeerCast installed on the remote host fails to properly sanitize user-supplied data<br />

passed to the 'handShakeHTTP()' function. An unauthenticated attacker can leverage this<br />

issue to crash the affected application and to possibly execute arbitrary code on the remote<br />

host subject to the privileges of the user running PeerCast.<br />

Solution: Upgrade to version 0.1218 or higher.<br />

CVE-2007-6454<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1124

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!