27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a web server with the default login and<br />

password set to admin/NULL\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

CVE Not available<br />

Allied Telesyn AT-8024(GB) Default Password<br />

<strong>PVS</strong> ID: 4833 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a Allied Telesyn AT-8024(GB) server with the<br />

default login and password set ('manager'/'admin').\nThe affected web application is:\n%P<br />

Solution: Change default passwords.<br />

GigaTribe Detection<br />

CVE Not available<br />

<strong>PVS</strong> ID: 4834 FAMILY: Web Servers RISK: INFO NESSUS ID:35468<br />

Description: Synopsis :\n\nThe remote web server appears to be used for peer-to-peer file<br />

sharing.\n\nAccording to its banner, the remote web server is from GigaTribe, a private<br />

peer-to-peer file sharing application. The reported version number is: %L<br />

Solution: Ensure that use of this software is compliant with your organization's acceptable use and<br />

security policies.<br />

CVE Not available<br />

Horde < 3.3.3 / 3.2.4 Horde_Image::factory driver Argument Local File Inclusion<br />

<strong>PVS</strong> ID: 4835 FAMILY: CGI RISK: HIGH NESSUS ID:35554<br />

Description: Synopsis : \n\nThe remote web server contains a PHP application that is susceptible to a<br />

local file inclusion attack.\n\nThe version of Horde, Horde Groupware, or Horde<br />

Groupware Webmail Edition installed on the remote host fails to filter input to the 'driver'<br />

argument of the 'Horde_Image: : factory' method before using it to include PHP code in<br />

'lib/Horde/Image.php'. Regardless of PHP's 'register_globals' and 'magic_quotes_gpc'<br />

settings, an unauthenticated attacker can exploit this issue to view arbitrary files or possibly<br />

to execute arbitrary PHP code on the remote host, subject to the privileges of the web<br />

server user ID.\n\n Note that this install is also likely affected by a cross-site scripting issue<br />

in the 'services/portal/cloud_search.php' script. The reported version of Horde is: \n %L<br />

Solution: Upgrade to version 3.3.3 / 3.2.4 or higher.<br />

CVE-2009-0932<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1276

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!