27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis : \n\nThe remote web server is hosting a web application that is affected by a<br />

security-bypass vulnerability.\n\nThe remote web server is hosting Centreon, a PHP-based<br />

application for monitoring networks.\n\nThe installed version of Centreon is earlier than<br />

2.1.4. Such versions are potentially affected by a security-bypass vulnerability which would<br />

allow an attacker to gain access to functionality such as ping or traceroute and access to<br />

LDAP import information. For your information, the observed version of Centreon is: \n<br />

%L<br />

Solution: Upgrade to Centreon 2.1.4 or later.<br />

CVE-2009-4368<br />

phpLDAPadmin < 1.2 Local File Inclusion<br />

<strong>PVS</strong> ID: 5291 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43402<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a local<br />

file inclusion attack.\n\nThe remote web server is hosting phpLDAPadmin, a web-based<br />

LDAP client. The installed version of phpLDAPadmin is earlier than 1.2.0. Such versions<br />

are potentially affected by a local file inclusion vulnerability because the application fails to<br />

properly sanitize user-supplied input to the 'cmd' parameter of the 'cmd.php' script. An<br />

unauthenticated user could exploit this flaw to view arbitrary files or possibly execute<br />

arbitrary PHP code on the remote host subject to the privileges of the web server user id.<br />

For your information, the observed version of phpLDAPadmin is : \n %L<br />

Solution: Upgrade to phpLDAPadmin 1.2.0 or later.<br />

CVE-2009-4427<br />

Transmission Client Detection<br />

<strong>PVS</strong> ID: 5292 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software which should be authorized with respect<br />

to Corporate policy.\n\nThe remote host is running the Transmission client version<br />

%L\nTransmission is a client application which allows users to quickly download files<br />

from multiple locations over the BitTorrent protocol.<br />

Solution: Ensure that Transmission is allowed with respect to Corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sendmail < 8.14.4 SSL Certificate NULL Character Spoofing<br />

<strong>PVS</strong> ID: 5293 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:43637<br />

Family Internet Services 1414

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!