27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 4728 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the IBM Tivoli Storage Manager version: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Opera < 9.62 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4729 FAMILY: Web Clients RISK: HIGH NESSUS ID:34680<br />

Description: Synopsis : \n\nThe remote host contains a web browser that is affected by several<br />

issues.\n\nThe version of Opera installed on the remote host is earlier than 9.62 and thus<br />

reportedly affected by several issues : \n\n - Opera fails to sanitize certain parameters<br />

passed to the 'History Search' (906).\n - The browser's same-origin policy may be violated<br />

because scripts running in the 'Links Panel' always run in the outermost frame of the page<br />

(907).\n\nSuccessful exploitation would result in the attacker being able to execute<br />

arbitrary script code in the unsuspecting user's browser and may also lead to cookie-based<br />

credential theft, browser setting modifications and other attacks. These attacks require that<br />

the attacker is able to trick a user into browsing to a malicious URI with the affected<br />

application. The reported version of Opera browser is: \n %L<br />

Solution: Upgrade to version 9.62 or higher.<br />

CVE-2008-4795<br />

UW-IMAP < 2007d.404 Multiple Utility Mailbox Name Overflow<br />

<strong>PVS</strong> ID: 4730 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThere is a flaw in the<br />

remote UW-IMAP server that allows a local user to execute arbitrary code on the server.<br />

The flaw is in the way that UW-IMAP handles malformed data sent to the 'tmail' and<br />

'dmail' local executables. An attacker exploiting this flaw would need local access as well<br />

as the ability to execute the aforementioned binaries. Successful exploiation would result in<br />

the attacker executing arbitrary code as the 'root' user. The observed banner (with version<br />

info) was: \n %L<br />

Solution: Upgrade to version 2007d.404 or higher.<br />

CVE-2008-5006<br />

Obsolete Web Server Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4731 FAMILY: Web Servers RISK: HIGH NESSUS ID:34460<br />

Description: Synopsis : \n\nThe remote web server is obsolete.\n\nAccording to its version, the remote<br />

web server is obsolete and no longer maintained by its vendor or provider. A lack of<br />

support implies that no new security patches are being released for it. The remote version<br />

of the web server was: \n %L<br />

Family Internet Services 1243

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!