27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 5086 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running a PHP application that is vulnerable to an<br />

authentication bypass attack.\n\nThe remote host is running BASE, a web-based tool for<br />

analyzing alerts from one or more SNORT sensors. The version of BASE installed on the<br />

remote host is earlier than 1.2.5. Such versions are reportedly fail to sufficiently validate<br />

'user', 'role', or passwords against the database in the 'readRoleCookie()' function of the<br />

'includes/base_auth.inc/php' script. An attacker could exploit this in order to bypass<br />

authentication and gain unauthorized access to the application. For your information, the<br />

reported version of BASE is: \n %L<br />

Solution: Upgrade to BASE version 1.2.5<br />

CVE Not available<br />

Samba < 3.3.6/3.2.13/3.0.35 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5087 FAMILY: Samba RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote Samba server may be affected by an unauthorized access<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host has a security bypass vulnerability. Access restrictions can be bypassed due to a read<br />

of uninitialized data in smbd. This could allow a user to modify an access control list<br />

(ACL), even when they should be denied permission.\n\nNote the 'dos filemode' parameter<br />

must be set to 'yes' in smb.conf in order for an attack to be successful (the default setting is<br />

'no'). For your information, the reported version of SAMBA is: \n %L<br />

Solution: Upgrade to Samba 3.3.6 / 3.2.13 / 3.0.35 or later, or apply the appropriate patch referenced<br />

in the project's advisory.<br />

CVE-2009-1886<br />

Movable Type < 4.26 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5088 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Movable Type, a blogging software for Unix and Windows platforms. The<br />

installed version is earlier than 4.26. Such versions are reportedly affected by multiple<br />

vulnerabilities : \n\n - An unspecified cross-site scripting vulnerability.\n\n - A<br />

security-bypass issue in the 'mt-wizard.cgi' script.\n\nFor your information, the reported<br />

version of Movable Type is : \n %L<br />

Solution: Upgrade to Movable Type 4.26 or later.<br />

CVE-2009-2481<br />

MyBB < 1.4.8 Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!