27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running the eTrust SCM SMTP notification service. This service is used<br />

to notify administrators when new software or signature updates have been made available.<br />

The reported version(s) of the antivirus signatures is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

PHP < 5.2.6 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4493 FAMILY: Web Servers RISK: HIGH NESSUS ID:32123<br />

Description: Synopsis :\n\nThe remote web server uses a version of PHP that is affected by<br />

multiple flaws.\n\nAccording to its banner ('%L'), the version of PHP installed<br />

on the remote host is older than 5.2.6. Such versions may be affected by the<br />

following issues :\n\n - A stack buffer overflow in FastCGI SAPI.\n - An integer<br />

overflow in printf().\n - An unspecified security issue tracked by<br />

CVE-2008-0599.\n - A safe_mode bypass in cURL.\n - Incomplete handling of<br />

multibyte chars inside escapeshellcmd().\n - Issues in the bundled PCRE fixed<br />

by version 7.6.<br />

Solution: Upgrade to version 5.2.6 or higher.<br />

CVE-2008-0599<br />

SAP MaxDB Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4494 FAMILY: Database RISK: HIGH NESSUS ID:32194<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple issues.\n\nThe remote<br />

host is running MaxDB, a database server from SAP. According to its version, the remote<br />

server is affected by multiple flaws.\n \n - A vulnerability in the 'vserver' process could<br />

allow an unauthenticated attacker to execute arbitrary code, subject to the privileges of the<br />

user under which the process operates. In order to successfully exploit this issue, an<br />

attacker must have prior knowledge of an active database name on the server.\n - A design<br />

error in 'sdbstarter' could allow an attacker to elevate his privileges to root level.\n - A<br />

vulnerability in cons.exe could allow command execution before authenticating to the<br />

database server.<br />

Solution: Upgrade to SAP MaxDB 7.7.04 Build 08 / 7.7.03 Build 23 / 7.7.02 Build 20 / 7.6.05 Build<br />

02 / 7.6.04 Build 06 / 7.6.03 Build 15 / 7.5.00 Build 48 or higher.<br />

CVE-2008-0307<br />

Novell eDirectory Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4495 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 1173

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!