27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is affected by multiple remote buffer overflow<br />

vulnerabilities.\n\nThe remote host is running Pidgin earlier than 2.5.6. Such versions are<br />

reportedly affected by multiple remote buffer overflow vulnerabilities : \n\n - A buffer<br />

overflow issue in the 'decrypt_out()' function can be exploited through specially crafted<br />

'QQ' packets. (CVE-2009-1374)\n\n - A buffer maintained by PurpleCircBuffer which is<br />

used by XMPP and Sametime protocol plugins can be corrupted if it's exactly full and then<br />

more bytes are added to it. (CVE-2009-1375)\n\n - A buffer overflow is possible when<br />

initiating a file transfer to a malicious buddy over XMPP. (CVE-2009-1373)\n\n - An<br />

integer-overflow issue exists in the application due to a n incorrect typecasting of 'int64' to<br />

'size_t'. (CVE-2009-1376)\n\nSuccessful exploitation could allow an attacker to execute<br />

arbitrary code on the remote host.For your information, the installed version of Pidgin is: \n<br />

%L<br />

Solution: Upgrade to Pidgin 2.5.6 or later.<br />

BASE < 1.4.3 XSS<br />

CVE-2009-1376<br />

<strong>PVS</strong> ID: 5033 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML Injection attack\n\nThe remote<br />

host is running BASE, a web-based tool for analyzing alerts from one or more SNORT<br />

sensors. The version of BASE installed on the remote host allows a remote attacker to<br />

inject HTML and perform cross-site scripting (XSS) attacks against unsuspecting users. In<br />

order to inject the malicious code, the attacker would need the ability to log into the BASE<br />

system. Successful exploitation would result in the attacker executing script code within the<br />

browser of other BASE users. The two php scripts which are vulnerable to injection are:<br />

'base_ag_main.php' and 'base_qry_main.php'. For your information, the reported version of<br />

BASE is: \n %L<br />

Solution: Upgrade to BASE version 1.4.3 or later.<br />

CVE Not available<br />

SoulSeek Version Detection<br />

<strong>PVS</strong> ID: 5034 FAMILY: Peer-To-Peer File Sharing RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the SoulSeek Peer to Peer application. SoulSeek is used to<br />

download and share files. As such, it should be authorized with respect to corporate<br />

policies and guidelines. The version of SoulSeek is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

lighttpd < 1.4.24 Information Disclosure<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1333

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!