27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Lotus Domino < 8.0.1 / 7.0.3 FP1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4517 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:32433<br />

Description: Synopsis :\n\nThe remote web server is affected by multiple vulnerabilities.\n\nAccording<br />

to its banner, the version of Lotus Domino on the remote host is older than 8.0.1 / 7.0.3<br />

FP1. The web server component of such versions is reportedly affected by a stack overflow<br />

that can be triggered by means of a specially-crafted 'Accept-Language' request header.<br />

While IBM only says this results in a denial of service, the original researchers claim to<br />

have a working proof-of-concept for Windows that allows arbitrary code execution with<br />

LOCAL SYSTEM privileges. In addition, the web server reportedly has an unspecified<br />

cross-site scripting vulnerability in its servlet engine / Web container.<br />

Solution: Upgrade to version 7.0.3 FixPack1 or 8.0.1<br />

CVE-2008-2240<br />

Barracuda Spam Firewall ldap_test.cgi Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 4518 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:32434<br />

Description: Synopsis :\n\nThe remote web server contains a CGI script that is affected by a cross-site<br />

scripting vulnerability.\n\nAccording to its firmware version, the remote Barracuda Spam<br />

Firewall device fails to filter input to the 'email' parameter of the '/cgi-bin/ldap_test.cgi'<br />

script before using it to generate dynamic content. An unauthenticated remote attacker may<br />

be able to leverage this issue to inject arbitrary HTML or script code into a user's browser<br />

to be executed within the security context of the affected site. For your information, the<br />

remote host is running firmware version: '%L'<br />

Solution: Either configure the device to limit access to the web management application by IP<br />

address or update to firmware release 3.5.11.025 or later.<br />

CVE-2008-2333<br />

Cerberus Helpdesk < Cerberus Helpdesk 4.0 Build 603<br />

<strong>PVS</strong> ID: 4519 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to UNSPECIFIED remote attack<br />

vectors\n\nThe remote host is running Cerberus Helpdesk version '%L', a web-based<br />

helpdesk suite written in PHP. The installed version of Cerberus Helpdesk on the remote<br />

host is vulnerable to several unspecified vulnerabilities.<br />

Solution: Patch the affected file as described in the forum thread referenced.<br />

CVE-2008-6440<br />

Possible Keylogger software installation detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1180

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!