27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: The vendor has released versions 5.2.5.4, 5.3.6.6, 5.4.2.7, and 5.5.2 to address these issues<br />

CVE-2008-4828<br />

Mort Bay Jetty < 6.1.17 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5017 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote<br />

instance of Mort Bay Jetty is vulnerable to a number of flaws. First, the application is<br />

vulnerable to a cross-site-scripting flaw when displaying web directory listings. Secondly,<br />

the application is prone to an information disclosure flaw which can be used to read files<br />

outside the web root. Note: in order for the second flaw to be executed, Jetty must have<br />

been configured to have DefaultServlet with support for aliases turned on. For your<br />

information, the reported version of Jetty is: \n %L \n<br />

Solution: Upgrade to Mort Bay Jetty 6.1.17 or later.<br />

CVE-2009-1524<br />

Openfire < 3.6.4 Arbitrary Password Manipulation<br />

<strong>PVS</strong> ID: 5018 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote server can be tricked into modifying user credentials\n\nThe<br />

remote host is running Openfire / Wildfire, an instant messaging server supporting the<br />

XMPP protocol. According to its version, the installation of Openfire or Wildfire is<br />

affected by a vulnerability which would allow a remote attacker to change the password of<br />

any users. In particular, input sent to the 'passwd_change' parameter of the jabber: iq: auth<br />

routine is not sufficiently sanitized. An attacker, exploiting this flaw, would be able to gain<br />

access to any user account.\n\nThe reported version of Openfire is: \n %L \n<br />

Solution: Upgrade to Openfire version 3.6.4 or later.<br />

CVE-2009-1596<br />

IceWarp Merak WebMail Server < 9.4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5019 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote webmail server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running IcewWarp WebMail Server - a webmail server for Windows and<br />

Linux. According to its banner, the version of IceWarp installed on the remote host is<br />

earlier 9.4.2. Such versions are reportedly affected by multiple vulnerabilities : \n\n -A SQL<br />

injection vulnerability in the search form of the web-based groupware component.<br />

(CVE-2009-1468)\n\n -A cross-site scripting vulnerability exists because the application<br />

fails to properly sanitize HTML emails. An attacker can exploit this flaw through the<br />

'cleanHTML()' function of the 'html/webmail/server/inc/tools.php' script.<br />

Family Internet Services 1328

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!