27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote server is a WebSphere application server. The reported version number is<br />

'%L'.\nThis version is reported to be vulnerable to a flaw in the<br />

serveServletsByClassnameEnabled module. While the details of this flaw are currently<br />

unknown, the vendor has released a fix.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0389<br />

Coppermine Photo Gallery < 1.4.11 Album Password Cookie SQL Injection<br />

<strong>PVS</strong> ID: 4351 FAMILY: CGI RISK: HIGH NESSUS ID:31137<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is prone to a SQL<br />

injection attack.\n\nThe version of Coppermine installed on the remote host fails to sanitize<br />

user-supplied input to the album password cookie before using it in a database query in the<br />

'get_private_album_set' function in 'include/functions.inc.php'. Regardless of PHP's<br />

'magic_quotes_gpc' setting, an attacker may be able to exploit this issue to manipulate<br />

database queries, leading to disclosure of sensitive information, execution of arbitrary code<br />

or attacks against the underlying database.<br />

Solution: Upgrade to version 1.4.11 or higher.<br />

CVE-2007-1107<br />

Citadel < 7.11 makeuserkey Function RCPT TO Command Remote Overflow<br />

<strong>PVS</strong> ID: 4352 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Citadel, a messaging software for Unix systems. There is a buffer overflow<br />

vulnerability in the remote version of this software that may be exploited by an attacker to<br />

execute arbitrary commands on the remote host. The flaw stems from a flaw when handling<br />

user-supplied 'RCPT TO' data. The application cannot handle 'RCPT TO' strings that are<br />

greater than 4096 bytes.<br />

Solution: Upgrade to version 7.11 or higher.<br />

CVE-2008-0394<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MyBB < 1.2.12 private.php options[disablesmilies] Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4353 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe version of<br />

MyBB installed on the remote host fails to sanitize input to the 'options[disablesmilies]'<br />

parameter of the 'private.php' script before using it in a SQL query. An attacker exploiting<br />

this flaw would need to be able to authenticate with a valid user ID and send data to the<br />

private.php script. Successful exploitation would result in the attacker executing arbitrary<br />

SQL commands on the database server utilized by MyBB.<br />

Family Internet Services 1134

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!