27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file\n\nThe<br />

version of Skype installed on the remote host is vulnerable to a flaw wherein specially<br />

formatted 'file://' URI will allow the download and execution of executable files. An<br />

attacker, exploiting this flaw, would need to be able to coerce a user into browsing a<br />

malicious URI. Successful exploitation would result in the attacker executing arbitrary<br />

code.<br />

Solution: Upgrade to Skype release 3.8.0.139.<br />

CVE-2008-1805<br />

Sun-One ASP Server Version Detection<br />

<strong>PVS</strong> ID: 4532 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sun-One ASP server version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Sun Java System ASP < 4.0.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4533 FAMILY: Web Servers RISK: HIGH NESSUS ID:33439<br />

Description: Synopsis :\n\nThe remote web server is affected by several vulnerabilities.\n\nThe remote<br />

host is running Sun Java System Active Server Pages (ASP), or an older variant such as<br />

Sun ONE ASP or Chili!Soft ASP. The web server component of the installed version of<br />

Active Server Pages on the remote host is affected by several vulnerabilities :\n\n - A flaw<br />

in an include file used by several of the administration server's ASP applications allows an<br />

attacker to write arbitrary data to a file specified by an attacker on the affected host. This<br />

issue does not affect ASP Server on a Windows platform (CVE-2008-2401).\n - Password<br />

and configuration data are stored in the administration server's web root and can be<br />

retrieved without credentials. This issue does not affect ASP Server on a Windows platform<br />

(CVE-2008-2402).\n - Multiple directory traversal vulnerabilities exist in several of the<br />

administration server's ASP applications can be abused to read or even delete arbitrary files<br />

on the affected host. This issue does not affect ASP Server on a Windows platform<br />

(CVE-2008-2403).\n - A stack buffer overflow allows code execution in the context of the<br />

ASP server (by default root) and can be exploited without authentication<br />

(CVE-2008-2404).\n - Several of the administration server's ASP applications fail to filter<br />

or escape user input before using it togenerate commands before executing them in a shell.<br />

While access to these applications nominally requires authentication, there are reportedly<br />

several methods of bypassing authentication (CVE-2008-2405).\nIAVA Reference :<br />

2008-A-0038\nSTIG Finding Severity : Category I<br />

Solution: Upgrade to Sun Java System ASP version 4.0.3 or later.<br />

CVE-2008-2405<br />

CA eTrust SCM Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1184

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!