27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows authenticated users to<br />

gain administrative access.\n\nThe version of WordPress installed on the remote host is<br />

vulnerable to a flaw in the way that it handles cookies. Specifically, an attacker with the<br />

ability to create specific accounts would be able to use the flaw in the cookie handler to<br />

gain administrative access to the application. The path to the vulnerable WordPress<br />

application is:\n%P<br />

Solution: Upgrade to version 2.5.1 or higher.<br />

CVE-2008-1930<br />

WebGUI < 7.4.35 Data Form List View Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 4489 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running WebGUI, a content management framework. The remote version of<br />

this software is vulnerable to an unspecified flaw. While the details of the flaw are<br />

currently unknown, the vendor has released a fix.<br />

Solution: Upgrade to version 7.4.35 or higher.<br />

CVE-2008-2077<br />

Sun Directory Version Detection<br />

<strong>PVS</strong> ID: 4490 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Sun Directory version: \n %L<br />

Solution: Ensure that you are running the latest version of this software.<br />

CVE Not available<br />

Sun Directory < 6.3 bind-dn Remote Privilege Escalation<br />

<strong>PVS</strong> ID: 4491 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Sun Directory<br />

version: \n %L \n\nThis version is vulnerable to a flaw in the way that it<br />

handles the 'bind-dn' parameter from a client. This may allow an attacker to<br />

gain administrative access.<br />

Solution: Upgrade to version 6.3 or higher.<br />

CVE-2008-1995<br />

eTrust SCM SMTP Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4492 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1172

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!