27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 6.9 Build 355 or higher.<br />

CVE-2008-6828<br />

CMS Made Simple admin/login.php cms_language Cookie Local File Inclusion<br />

<strong>PVS</strong> ID: 4773 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34992<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is susceptible to a<br />

local file inclusion attack.\n\nThe remote host is running CMS Made Simple, a content<br />

management system written in PHP. The version of CMS Made Simple installed on the<br />

remote host fails to sanitize user-supplied input to the 'cms_language' cookie when passed<br />

to the 'admin/login.php' script before using it to include PHP code. Regardless of PHP's<br />

'register_globals' and 'magic_quotes_gpc' settings, an unauthenticated attacker may be able<br />

to leverage this issue to view arbitrary files or possibly to execute arbitrary PHP code on<br />

the remote host, subject to the privileges of the web server user ID. The reported version of<br />

CMS Made Simple is: \n %L<br />

Solution: No solution is known at this time.<br />

CVE-2008-5642<br />

Samba 3.0.29 - 3.2.4 Potential Memory Disclosure<br />

<strong>PVS</strong> ID: 4774 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34993<br />

Description: Synopsis : \n\nThe remote Samba server may be affected by an information disclosure<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host is between 3.0.29 and 3.2.4 inclusive. Such versions reportedly can potentially leak<br />

arbitrary memory contents of the 'smbd' process due to a missing bounds check on<br />

client-generated offsets of secondary 'trans', 'trans2', and 'nttrans' requests. The reported<br />

version is: \n %L<br />

Solution: Upgrade to version 3.2.5 / 3.0.33 or higher or apply the appropriate patch referenced in the<br />

project's advisory.<br />

CVE-2008-4314<br />

WordPress wp-includes/feed.php self_link() Function Host Header RSS Feed XSS<br />

<strong>PVS</strong> ID: 4775 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:34994<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is affected by a<br />

cross-site scripting vulnerability.\n\nThe version of WordPress installed on the remote host<br />

fails to completely sanitize input to the the 'Host' request header before using it in the<br />

'self_link()' function in 'wp-includes/feed.php' to generate dynamic HTML output. An<br />

attacker may be able to leverage this to inject arbitrary HTML and script code into a user's<br />

browser to be executed within the security context of the affected site. The reported version<br />

Family Internet Services 1257

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!