27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TurboFTP 'DELE' FTP Command Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 5300 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:43877<br />

Description: Synopsis : \n\nThe remote FTP server is vulnerable to a remote denial of service<br />

attack.\n\nThe remote host is running the TurboFTP FTP server. The installed version of<br />

TurboFTP is earlier than 1.00.720. Such versions are potentially affected by a remote<br />

buffer overflow vulnerability when handling an overly large string that is passed to the<br />

'DELE' FTP command. An attacker, exploiting this flaw, could crash the affected service.<br />

For your information, the observed version of TurboFTP is: \n %L<br />

Solution: Upgrade to TurboFTP 1.00.720<br />

CVE Not available<br />

Zope 'standard_error_message' Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5301 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to a<br />

cross-site scripting attack.\n\nThe remote Zope server is vulnerable to a cross-site scripting<br />

flaw related to the 'standard_error_message' template. An attacker, exploiting this flaw,<br />

could execute arbitrary script code in a user's browser. For your information, the observed<br />

version of Zope server is: \n %L<br />

Solution: Upgrade to Zope 2.8.12, 2.9.12, 2.10.22, 2.11.6, 2.12.3, or later.<br />

CVE-2010-1104<br />

DokuWiki < DokuWiki Release 2009-12-25 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5302 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:44059<br />

Description: Synopsis : \n\nThe remote web server is hosting an application that is vulnerable to<br />

multiple attack vectors.\n\nThe remote web server is hosting a release of DokuWiki earlier<br />

than DokuWiki 2009-12-25. Such versions are potentially affected by multiple<br />

vulnerabilities : \n\n - A security-bypass vulnerability that can be exploited through the<br />

'cmd[save]', 'cmd[del]', and 'cmd[update]' parameters of the 'lib/plugins/acl/ajax.php'<br />

script.\n\n - An information-disclosure vulnerability in the 'ns' parameter of the 'ajax.php'<br />

script.\n\nFor your information, the observed version of DokuWiki is: \n %L<br />

Solution: Upgrade to DokuWiki Release 2009-12-25 or later.<br />

CVE-2010-0288<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Sun Java System Identity Manager 8.1 Privilege Escalation Vulnerability<br />

<strong>PVS</strong> ID: 5303 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1417

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!