27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RaidenHTTPD <<br />

<strong>PVS</strong> ID: 4319 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running RaidenHTTPD, a web server for Windows. Specifically, the 'ulang'<br />

parameter of the 'raidenhttpd-admin/workspace.php' script fails to adequately parse<br />

user-supplied data. A request containing '../' would allow an attacker to gain access to files<br />

outside the web root.<br />

Solution: Upgrade to a version higher than 2.0.19.<br />

CVE-2007-6453<br />

CUPS < 1.3.5 Back End SNMP Response Remote Overflow<br />

<strong>PVS</strong> ID: 4320 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Common Unix Printing System (CUPS) daemon. This version of CUPS is<br />

vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP<br />

responses. An attacker sending a malformed SNMP response would be able to execute<br />

arbitrary code on the remote system. In order to exploit this flaw, the attacker would need<br />

for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond<br />

to SNMP messages bound for valid hosts.<br />

Solution: Upgrade to a version 1.3.5 or higher<br />

CVE-2007-5849<br />

ClamAV < 0.92.0 PE File Handling Integer Overflow<br />

<strong>PVS</strong> ID: 4321 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ClamAV antivirus client version %L\n\nThis version of ClamAV is vulnerable<br />

to a remote integer overflow due to a content-parsing flaw when handling malformed PE<br />

files. An attacker exploiting this flaw would only need the ability to send a malformed<br />

attachment to a system protected by ClamAV. Successful exploitation would result in the<br />

attacker overwriting critical memory blocks and either crashing the service or executing<br />

arbitrary code.<br />

Solution: Upgrade to version 0.92.0 or higher.<br />

CVE-2007-6596<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Flash Player < 9.0.115.0 / 7.0.73.0 APSB07-20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4322 FAMILY: Web Clients RISK: HIGH NESSUS ID:29741<br />

Family Internet Services 1125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!