27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Novell iManager < 2.7 SP1 Property Book Pages <strong>Security</strong> Bypass<br />

<strong>PVS</strong> ID: 4618 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:33867<br />

Description: Synopsis :\n\nThe remote web server is affected by a security bypass<br />

vulnerability.\n\nNovell iManager is installed on the remote host. The version of iManager<br />

installed reportedly fails to implement sufficient access control checks on 'Property Book<br />

Pages' created with Plug-in Studio before granting delete privileges on them to a user.<br />

Solution: Upgrade to version 2.7 SP1 (iManager 2.7.1) or higher.<br />

CVE-2008-3488<br />

Gallery < 1.5.8 modules.php phpEx Parameter Traversal Local File Inclusion<br />

<strong>PVS</strong> ID: 4619 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running Gallery, a web-based photo album<br />

application written in PHP. The version of Gallery installed on the remote host is less than<br />

1.5.8. This version of Gallery is vulnerable to a local file inclusion vulnerability. The root<br />

of the flaw is in the 'phpEx' parameter of the '/contrib/phpBB2/modules.php' script. An<br />

attacker exploiting this flaw would send a specially formatted request to the modules.php<br />

application. The request would likely include a directory traversal to some local file on the<br />

server. e.g. '../../../etc/passwd'. Successful exploitation would result in the attacker gaining<br />

'read' access to confidential files. The reported version of Gallery is: \n %L \n<br />

Solution: Upgrade to version 1.5.8 or higher.<br />

CVE Not available<br />

PHP < 4.4.9 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4620 FAMILY: Web Servers RISK: HIGH NESSUS ID:33849<br />

Description: Synopsis : \n\nThe remote web server uses a version of PHP that is affected by multiple<br />

issues.\n\nAccording to its banner, the version of PHP installed on the remote host is older<br />

than 4.4.9. Such versions address several security issues, including : \n\n - An update of<br />

PCRE to version 7.7.\n - An overflow in memnstr().\n - A crash in imageloadfont when an<br />

invalid font is given.\n - An open_basedir handling issue in the curl extension.\n -<br />

'mbstring.func_overload' set in '.htaccess' becomes global. Note that the release<br />

announcement states this will be the last release for the PHP 4.4 series. The reported<br />

version of PHP is: \n %L<br />

Solution: Upgrade to version 4.4.9 or higher.<br />

CVE-2008-3660<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache Tomcat < 6.0.18 UTF-8 Directory Traversal Arbitrary File Access<br />

Family Internet Services 1210

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!