27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2008-4293<br />

SQL Worm Client Detection<br />

<strong>PVS</strong> ID: 4635 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host has been compromised and is running a 'backdoor'<br />

program.\n\nThe remote host appears to be infected with a SQL worm. The worm is<br />

attempting to spread via other web servers. The observed network traffic from this machine<br />

was: \n %L<br />

Solution: Manually examine and clean the host.<br />

CVE Not available<br />

Kayako SupportSuite Version Detection<br />

<strong>PVS</strong> ID: 4636 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Kayako SupportSuite version: %L<br />

Solution: N/A<br />

CVE Not available<br />

Kayako SupportSuite < 3.30.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4637 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34029<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application affected by several<br />

vulnerabilities.\n\nThe remote host is running Kayako SupportSuite, a web-based electronic<br />

support portal written in PHP. According to its banner, the version of Kayako installed on<br />

the remote host is earlier than 3.30.01 and is affected by several issues: \n\n - There is a<br />

blind SQL injection issue in the staff panel that enables a staff user to gain administrative<br />

access.\n - A user may be able to inject arbitrary script into a user's browser by opening a<br />

ticket or requesting a chat if they include the script in the 'Full Name' field associated with<br />

their account.\n - There are numerous cross-site scripting issues. The reported version of<br />

SupportSuite is: \n %L<br />

Solution: Upgrade to version 3.30.01 or higher.<br />

CVE-2008-3701<br />

DB2 < 9.5 Fix Pack 2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4638 FAMILY: Database RISK: HIGH NESSUS ID:34056<br />

Description: Synopsis :\n\nThe remote database server is affected by multiple vulnerabilities.\n\nThe<br />

installation of DB2 9.5 on the remote host does not have Fix Pack 2 applied and is affected<br />

by multiple vulnerabilities :\n\n - An unspecified vulnerability in the way it deploys 'CLR<br />

Family Internet Services 1215

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!