27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2008-56)\n - There is an error in the method used to parse the default namespace in an E4X<br />

document caused by quote characters in the namespace not being properly escaped. (MFSA<br />

2008-58)\n - Scripts in a malicious mail message can access the .document URI and<br />

.textContext DOM properties. (MFSA 2008-59)\n\nThe reported version of Thunderbird is:<br />

\n %L<br />

Solution: Upgrade to version 2.0.0.18 or higher.<br />

CVE-2008-5052<br />

Symantec Backup Exec Detection<br />

<strong>PVS</strong> ID: 4763 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Symantec Backup Exec, an enterprise solution for managing<br />

archived data. The reported version is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

Ruby on Rails < 2.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 4764 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

server is running the Ruby on Rails web application. The reported version is '%L'\nThis<br />

version of Rails is reported to be vulnerable to a flaw in the way that it handles<br />

user-supplied input to the 'redirect_to()' function in the 'ActionController::Base' class. An<br />

attacker exploiting this flaw would be able to inject arbitrary HTTP headers that could lead<br />

to cross-site request forgery (CSRF), cross-site scripting (XSS) and other attacks.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2008-5189<br />

MDaemon WorldClient < 10.0.2 Script Injection<br />

<strong>PVS</strong> ID: 4765 FAMILY: POP Server<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34849<br />

Description: Synopsis : \n\nThe remote mail server is prone to a script injection vulnerability.\n\nThe<br />

remote host is running Alt-N MDaemon, a mail server for Windows. According to its<br />

banner, a version of MDaemon mail server older than 10.0.2 is installed on the remote host.<br />

Such versions ship with a version of WorldClient (a webmail client) that is affected by a<br />

script injection vulnerability. By tricking a user into opening a specially crafted email, an<br />

attacker can exploit this issue to execute script code in the user's browser in the security<br />

context of the affected application and thereby steal cookie based credentials or launch<br />

other attacks. The reported version of MDaemon is: \n %L<br />

Family Internet Services 1254

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!