27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Altiris AClient < 6.9.164 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4419 FAMILY: Generic RISK: HIGH NESSUS ID:31417<br />

Description: Synopsis :\n\nThe remote Windows host has a program that is affected by multiple<br />

privilege escalation vulnerabilities.\n\nThe version of the Altiris Client Agent (aclient)<br />

installed on the remote host is reportedly susceptible to a shatter attack that could allow a<br />

local user to elevate his or her privileges on the affected system.<br />

Solution: Upgrade to version 6.9.164 or higher.<br />

CVE-2008-1754<br />

phpList < 2.10.9 Multiple Remote File Inclusion<br />

<strong>PVS</strong> ID: 4420 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is susceptible to<br />

multiple remote file inclusion attacks.\n\nThe version of phpList installed on the remote<br />

host fails to filter user input to the '_SERVER[ConfigFile]' and '_ENV[CONFIG]'<br />

parameters of the 'admin/index.php' script before passing it to PHP 'include()' functions.<br />

Provided PHP's 'register_globals' setting is disabled, an unauthenticated attacker can exploit<br />

this issue to view arbitrary files on the remote host or to execute arbitrary PHP code,<br />

possibly taken from third-party hosts. The reported version of phpList is: \n %L<br />

Solution: Upgrade to version 2.10.9 or higher.<br />

CVE Not available<br />

Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (949031)<br />

<strong>PVS</strong> ID: 4421 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:31414<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the email<br />

client.\n\nThe remote host is running a version of Outlook or Exchange that is vulnerable to<br />

a bug when processing a specially malformed URI mailto: link, which can let an attacker<br />

execute arbitrary code on the remote host by sending a specially crafted email.\nIAVA<br />

Reference : 2008-A-0012\nSTIG Finding Severity : Category II<br />

Solution: Microsoft has released a set of patches for Outlook 2000, XP, 2003 and 2007.<br />

SSF Server Detection<br />

CVE-2008-0110<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4422 FAMILY: SSH RISK: LOW NESSUS ID:31421<br />

Description: Synopsis :\n\nThe remote version of the SSH server is no longer maintained.\n\nAccording<br />

to its banner, the remote SSH server is a SSF derivative. SSF had been written to be<br />

compliant with restrictive laws on cryptography in some European countries. These<br />

regulations have been softened and OpenSSH received a formal authorization from the<br />

Family Internet Services 1153

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!