27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Apply Fix Pack 19 (6.1.0.19) or higher.<br />

CVE-2008-4111<br />

Invision Power Board < 2.3.6 index.php name Parameter SQL Injection<br />

<strong>PVS</strong> ID: 4686 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running Invision Board, a CGI suite designed to set up a bulletin board system on the<br />

remote web server. This version of Invision Board is vulnerable to a SQL injection attack<br />

due to a lack of parsing on the 'name' parameter of the index.php script. An attacker<br />

exploiting this flaw would be able to execute arbitrary commands against the remote<br />

database server. The reported version of Invision was: \n %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2008-4171<br />

ProFTPD Command Truncation Cross-Site Request Forgery<br />

<strong>PVS</strong> ID: 4687 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34265<br />

Description: Synopsis :\n\nThe remote FTP server is prone to a cross-site request forgery attack.\n\nThe<br />

remote host is using ProFTPD, a free FTP server for Unix and Linux. The version of<br />

ProFTPD running on the remote host splits an overly long FTP command into a series of<br />

shorter ones and executes each in turn. If an attacker can trick a ProFTPD administrator<br />

into accessing a specially-formatted HTML link, he may be able to cause arbitrary FTP<br />

commands to be executed in the context of the affected application with the administrator's<br />

privileges.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5815<br />

MyBB < 1.4.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4688 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

MyBB installed on the remote host is vulnerable to a number of vulnerabilities. The<br />

application fails to properly parse and sanitize data sent to the following scripts: global.php,<br />

announcements.php, admin/inc/class_page.php, inc/functions.php,<br />

inc/datahandlers/post.php, inc/class_error.php, polls.php, moderation.php,<br />

inc/class_moderation.php, usercp.php, and attachments.php. The details of these flaws is<br />

currently unknown; however, the vendor has released a fix. The reported version of MyBB<br />

is: \n %L<br />

Solution: Upgrade to version 1.4.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1230

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!