27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 4952 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running FileZilla version: \n %L \n\nThis version of FileZilla is reported to<br />

be vulnerable to a Denial of Service (DoS) attack. The nature of the attack seems to take<br />

place within the SSL/TLS code. An attacker exploiting this flaw would be able to crash the<br />

service.<br />

Solution: Upgrade to version 0.9.31 or higher.<br />

CVE-2009-0884<br />

IBM Tivoli Storage Manager < 5.4.2.6 / 5.5.1.8 Overflow<br />

<strong>PVS</strong> ID: 4953 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the IBM Tivoli Storage Manager version: \n %L \n\nThis version of TSM contains<br />

a client that is prone to a remote buffer overflow. An attacker exploiting this flaw would<br />

need the ability to send malicious data to the service. Successful exploitation would result<br />

in the attacker executing arbitrary code on the system.<br />

Solution: Upgrade to version 5.4.2 6, 5.5.1.8 or higher.<br />

CVE-2009-0869<br />

Nucleus CMS < 3.40 Unspecified Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 4954 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Nucleus CMS version: \n %L \n\nNucleus is a content-management system<br />

that runs on PHP web servers. This version of Nucleus is vulnerable to a flaw in the way<br />

that the media manager handles user-supplied data. An attacker can traverse out of the web<br />

directory and gain access to data that may be confidential.<br />

Solution: Upgrade to version 3.40 or higher.<br />

CVE-2009-0929<br />

WINS Server Detection<br />

<strong>PVS</strong> ID: 4955 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Windows Internet Name Server (WINS).<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1308

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!