27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Serv-U < 7.4.0.0 Multiple Command Argument Handling DoS<br />

<strong>PVS</strong> ID: 4810 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35328<br />

Description: Synopsis : \n\nThe remote FTP server is affected by a denial of service<br />

vulnerability.\n\nThe remote host is running Serv-U File Server, an FTP server for<br />

Windows. The installed version of Serv-U 7.x is earlier than 7.4.0.0, and is affected by a<br />

denial of service vulnerability. By using a specially crafted command such as XCRC,<br />

STOU, DSIZ, AVBL, RNTO, or RMDA, it may be possible for an authenticated attacker to<br />

render the FTP server temporarily unresponsive. The reported version of Serv-U is: \n %L<br />

Solution: Upgrade to version 7.4.0.0 or higher.<br />

CVE Not available<br />

HDHomerun Server Detection<br />

<strong>PVS</strong> ID: 4811 FAMILY: Policy RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running HDHomerun, an application used to stream digital media.<br />

Ensure that such applications are authorized according to existing policies.<br />

Solution: N/A<br />

CVE Not available<br />

Comersus Cart < 7.099 Remote Password Disclosure<br />

<strong>PVS</strong> ID: 4812 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application allows unauthorized access to other user<br />

accounts.\n\nThe installed version of Comersus Cart on the remote host suffers from a flaw<br />

where registered users can modify the email address and password of other users. The root<br />

cause is a failure of the 'comersus_customerModifyExec.asp' script to sanitize<br />

user-supplied input. An attacker exploiting this flaw would be able to change the<br />

credentials of other users. The reported version of Comersus Cart is: \n %L \n<br />

Solution: Upgrade to version 7.099 or higher.<br />

CVE Not available<br />

Simple Machines Forum < 1.1.8 Password Reset Function Bypass<br />

<strong>PVS</strong> ID: 4813 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 1270

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!