27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Agnitum Outpost <strong>Security</strong> Suite < 6.5.2358.316.0607 Detection Engine Bypass<br />

<strong>PVS</strong> ID: 4604 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote client is running the Agnitum Outpost security suite. This suite of tools protects<br />

users from viruses, phishing attacks, malware and more. The observed version was: \n %L<br />

\n\nThe vendor has reported an issue where specially formatted file names may bypass the<br />

detection engines. An attacker exploiting this flaw would need to be able to convince an<br />

Outpost user to open a malicious file. Successful exploitation would result in the attacker<br />

bypassing the security rules and passing a malicious file to the client.<br />

Solution: Upgrade to version 6.5.2358.316.0607 or higher.<br />

CVE Not available<br />

Mantis < 1.1.2 account_prefs_update.php language Parameter Traversal Local File Inclusion<br />

<strong>PVS</strong> ID: 4605 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Mantis Bug Tracker version: '%L'\n\nThe version of Mantis Bug Tracker<br />

installed on the remote host does not properly parse user-supplied data to the 'language'<br />

parameter of the 'account_prefs_update.php' script. An attacker can gain 'read' access to<br />

local files or execute arbitrary files that are already present on the web server. An attacker<br />

exploiting this flaw would send a specially formatted 'language' parameter to the affected<br />

script. This parameter would probably contain file names preceded by directory-traversal<br />

strings.<br />

Solution: Upgrade to version 1.1.2 or higher.<br />

CVE-2008-3333<br />

Retrospect Backup Client <<br />

<strong>PVS</strong> ID: 4606 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33561<br />

Description: Synopsis : \n\nThe remote backup client is affected by multiple<br />

vulnerabilities.\n\nAccording to its version number, the Retrospect Backup Client installed<br />

on the remote host is affected by several vulnerabilities : \n\n - An error in the client may<br />

lead to memory corruption and in turn a denial of service condition when processing<br />

specially-crafted packets, although only when an English client is used on a Chinese<br />

operating system, which is not a supported configuration.\n - The password hash is sent<br />

over the network unencrypted, which could result in its disclosure.\n - A null pointer<br />

dereference error may lead to a denial of service condition.\n\nThe reported version number<br />

is: \n %L<br />

Family Internet Services 1205

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!