27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Apply patch PHNE_38458 or later.<br />

CVE-2008-1668<br />

Sun Java System Web Proxy Server Detection<br />

<strong>PVS</strong> ID: 4625 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a Sun Java System web proxy server. This server retrieves web pages<br />

for internal clients. The reported version number was: \n %L<br />

Solution: N/A<br />

Sympa <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4626 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in an application that handles<br />

local files.\n\nThe remote host is running Sympa, an open-source mailing list software<br />

application. The reported version number is '%L'\n\nThis version of Sympa is vulnerable to<br />

a flaw due to the way that sympa.pl creates files when the '--make_alias_file' option is used.<br />

An attacker exploiting this flaw would need local access. Successful exploitation would<br />

result in the attacker overwriting local files which the Sympa application had permissions<br />

on.<br />

Solution: Upgrade to a version higher than 5.4.3.<br />

CVE-2008-4476<br />

PHP Live! Helper < 2.1.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4627 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHP Live Helper, a customer support application, version: \n %L \n\nThis<br />

version of Live Helper is vulnerable to a number of flaws. \n\nThere is a SQL injection<br />

flaw when handling malformed data to the 'dep' parameter of the 'onlinestatus_html.php'<br />

script. An attacker exploiting this flaw would be able to execute arbitrary SQL commands<br />

against the database server.\n\nThere is a flaw in the way that the application handles data<br />

passed to the 'libsecure.php' source file. An attacker exploiting this flaw would be able to<br />

change the behavior of the database server.\n\nThere is a flaw in the way that the<br />

application handles data to the 'rg' parameter of the 'globalsoff.php' file. An attacker<br />

exploiting this flaw might be able to get arbitrary code executed via an 'eval()' function call.<br />

Solution: Upgrade to version 2.1.0 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1212

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!