27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote host is vulnerable to a security bypass flaw.\n\nThe remote host<br />

is running Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a flaw where attackers can bypass security filtering by surrounding the<br />

content with an incomplete BBcode block. Successful exploitation would result in the<br />

attacker posting banned content within the web content. The reported version of SMF is: \n<br />

%L \n<br />

Solution: Upgrade to version 1.1.7 or higher.<br />

CVE Not available<br />

eDirectory < 8.7.3 SP10 FTF1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4704 FAMILY: Generic RISK: HIGH NESSUS ID:34349<br />

Description: Synopsis :\n\nThe remote directory service is affected by multiple vulnerabilities.\n\n The<br />

remote host is running eDirectory, a directory service software from Novell. The installed<br />

version of Novell eDirectory is affected by multiple heap overflows and denial of service<br />

vulnerabilities :\n\n - DS module is affected by two heap overflow vulnerabilities (Bugs<br />

407275, 407256).\n - EMBOX module is affected by two denial of service vulnerabilities<br />

(Bugs 407243, 407245).<br />

Solution: Upgrade to eDirectory 8.7.3 SP10 FTF1 or higher.<br />

CVE-2008-5038<br />

Trend Micro OfficeScan < 7.3 Build 3172 Client Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 4705 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34362<br />

Description: Synopsis : \n\nThe remote web server is affected by a directory traversal issue.\n\n The<br />

version of Trend Micro OfficeScan client running on the remote host is affected by a<br />

directory traversal issue, which can be leveraged by an unauthenticated remote attacker to<br />

read arbitrary files on the remote host. Note that successful exploitation requires that<br />

'Tmlisten.exe' be configured to receive updates from other clients. The reported version of<br />

OfficeScan is: \n %L<br />

Solution: Upgrade to version 7.3 Build 3172 or higher.<br />

CVE-2008-2439<br />

Opera < 9.60 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4706 FAMILY: Web Clients RISK: HIGH NESSUS ID:34368<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is earlier than 9.60 and is<br />

reportedly affected by several issues :\n - Specially crafted URLs can cause Opera to crash<br />

or allow arbitrary code execution.\n - Once a Java applet has been cached, a page that can<br />

predict the cache path for that applet can load it from cache thereby causing it to run in the<br />

Family Internet Services 1236

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!