27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote database server is affected by multiple issues.\n\nThe<br />

installation of DB2 9.5 on the remote host does not have any Fix Packs applied and thus is<br />

affected by one or more of the following issues : \n\n - There is a security vulnerability in<br />

the 'NNSTAT' procedure on Windows platforms only that allows low-privileged users to<br />

overwrite arbitrary files (IZ10776).\n - There is a security vulnerability in the<br />

'SYSPROC.ADMIN_SP_C' procedure on Windows platforms that allows users to load<br />

arbitrary libraries and execute arbitrary code in the system (IZ10917).\n - An unspecified<br />

vulnerability affects 'DB2WATCH' and 'DB2FREEZE' on Solaris platforms (IZ12994).\n -<br />

An authenticated remote user can cause the DB2 instance to crash by passing specially<br />

crafted parameters to the 'RECOVERJAR' and 'REMOVE_JAR' procedures (IZ15496).\n -<br />

There is an internal buffer overflow vulnerability in the DAS process that could allow<br />

arbitrary code execution on the affected host (IZ12406).\n - A local attacker can create<br />

arbitrary files as root on Unix and Linux platforms using symlinks to the<br />

'dasRecoveryIndex', 'dasRecoveryIndex.tmp', '.dasRecoveryIndex.lock', and<br />

'dasRecoveryIndex.cor' files during initialization (IZ12798).\n - There is a security<br />

vulnerability related to a failure to switch the owner of the 'db2fmp' process affecting Unix<br />

and Linux platforms (IZ19155).\n - When a memory dump occurs, the password used to<br />

connect to the database remains visible in clear text in memory (JR28314). The reported<br />

version/build of the remote DB2 server is: \n %L<br />

Solution: Apply DB2 Version 9.5 Fix Pack 1.<br />

CVE-2008-1998<br />

Coppermine Photo Gallery < 1.4.19 data Cookie Local File Inclusion<br />

<strong>PVS</strong> ID: 4613 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33789<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by a local<br />

file inclusion vulnerability.\n\nThe version of Coppermine installed on the remote host fails<br />

to sanitize input to the 'lang' array element of its data cookie before using it in<br />

'include/init.inc.php' to include PHP code. Provided the application's character set is set to<br />

'utf-8', which is default, an unauthenticated remote attacker can exploit this issue to view<br />

arbitrary files or possibly to execute arbitrary PHP code on the remote host subject to the<br />

privileges of the web server user ID.<br />

Solution: Upgrade to version 1.4.19 or higher.<br />

CVE-2008-3486<br />

Apache Tomcat < 4.1.37/5.5.26/6.0.16 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4614 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Apache Tomcat version: \n %L \n\nThis version of Tomcat is reported to be<br />

vulnerable to several flaws. First, the application fails to sanitize user input to the<br />

'RequestDispatcher' method. An attacker exploiting this flaw could request content outside<br />

Family Internet Services 1208

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!