27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Stored Procedures' for Visual Studio from IBM database add-ins (JR28431). - A buffer<br />

overflow condition in the DAS server code. (IZ22188)<br />

Solution: Apply DB2 Version 9.5 Fix Pack 2.<br />

Sharity Detection<br />

CVE-2008-6821<br />

<strong>PVS</strong> ID: 4639 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Sharity service for Unix. Sharity is a service that allows<br />

Unix computers to access SMB/CIFS servers.<br />

Solution: N/A<br />

Invision Power Board <<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4640 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Invision Board, a CGI suite designed to set up a bulletin board system on the<br />

remote web server. This version of Invision Board is vulnerable to several SQL injection<br />

attacks due to a lack of parsing on the 'act' and 'name' variables of the index.php script.<br />

There is an information disclosure flaw where authentication materials can be retrieved<br />

from 'ipb_stronghold' cookies. There is a vulnerability that allows attackers to hijack<br />

administrative sessions. There is a denial of service vulnerability due to a lack of parsing to<br />

the 'clean_globals()' function. There is a flaw in the 'source/action_admin/languages.php'<br />

where an attacker can inject code that is later executed via an 'eval()' function. Finally,<br />

there is a flaw in the way that the application handles data sent to the 'INFO[base_url]'<br />

parameter of the 'admin.php' script. A remote attacker can invoke arbitrary PHP script code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

eDirectory < 8.8 SP3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4641 FAMILY: Generic RISK: HIGH NESSUS ID:34221<br />

Description: Synopsis :\n\nThe remote directory service is affected by multiple vulnerabilities.\n\nThe<br />

remote host is running eDirectory, a directory service software from Novell. The installed<br />

version of Novell eDirectory is affected by multiple issues :\n\n - NDS module is affected<br />

by a heap overflow vulnerability (Bugs 396819 and 396817).\n - Windows installs of<br />

eDirectory are affected by a remote memory corruption vulnerability (Bug 373852).\n -<br />

LDAP module is affected by a buffer overflow vulnerability (Bug 373853).\n - HTTPSTK<br />

is affected by two heap overflow vulnerabilities affecting 'Language' and 'Content Length'<br />

headers in HTTPSTK (Bugs 379882 and 379880).\n - HTTPSTK is also affected by a<br />

cross-site scripting vulnerability (Bug 387429).<br />

Family Internet Services 1216

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!