27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote Windows host has a program that is prone to a buffer overflow<br />

attack.\n\nThe version of the SQL Anywhere MobiLink Server installed on the remote host<br />

reportedly is affected by a heap-based buffer overflow when handling strings such as the<br />

username, version and remote ID that are longer than 128 bytes. An unauthenticated<br />

attacker may be able to leverage this issue to execute arbitrary code on the affected system.<br />

Solution: Upgrade to SQL Anywhere 10.0.1 build 3649 or higher.<br />

CVE-2008-0912<br />

Sybase SQL Anywhere Database Version Detection<br />

<strong>PVS</strong> ID: 4396 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sybase SQL Anywhere database server. The reported version is: %L<br />

Solution: N/A<br />

CVE Not available<br />

OSSIM Version Detection<br />

<strong>PVS</strong> ID: 4397 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Open Source <strong>Security</strong> Information Management (OSSIM)<br />

server. This security software is used for managing security data and tasks. The software is<br />

available via the following URI: '%P' and the reported version is OSSIM %L<br />

Solution: N/A<br />

OSSIM <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4398 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:31133<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple flaws.\n\nThe remote host is running OSSIM (Open Source <strong>Security</strong> Information<br />

Management), a suite of security tools managed by a web-based front-end. The version of<br />

OSSIM installed on the remote host fails to sanitize user input to the 'dest' parameter of the<br />

'session/login.php' script before using it to generate dynamic HTML output. An<br />

unauthenticated attacker can exploit this to inject arbitrary HTML and script code into a<br />

user's browser to be executed within the security context of the affected site. In addition,<br />

there is a SQL injection flaw within the 'modifyportform.php' script. An attacker exploiting<br />

this flaw would need the ability to authenticate to the application.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-0920<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!