27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 5529 FAMILY: Web Clients RISK: HIGH NESSUS ID:46242<br />

Description: Synopsis : \n\nThe remote host contains an application that is vulnerable to a buffer<br />

overflow attack.\n\nThe remote host contains Beyond Compare, a file comparison<br />

application. The installed version of Beyond Compare is earlier than 3.1.11. Such version<br />

are potentially affected by a buffer overflow vulnerability when handling zip files with an<br />

overly large filename. An attacker, exploiting this flaw, could potentially execute arbitrary<br />

code on the remote host subject to the privileges of the user running the application.\nFor<br />

your information, the observed version of Beyond Compare is: \n %L<br />

Solution: Upgrade to Beyond Compare 3.1.11 or later.<br />

CVE Not available<br />

CMS Made Simple < 1.7.1 Cross-Site Scripting Vulnerability<br />

<strong>PVS</strong> ID: 5530 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web server is running a PHP application that is affected by a<br />

cross-site scripting vulnerability.\n\nThe remote host is running CMS Made Simple, a<br />

web-based content management application written in PHP. The installed version of CMS<br />

Made Simple is earlier than 1.7.1. Such versions are potentially affected by a cross-site<br />

scripting vulnerability because the application fails to properly sanitize user supplied input<br />

to the 'date_format_string' variable of the 'admin/editprefs.php' script. An attacker with<br />

administrator privileges, could exploit this flaw to execute arbitrary script code in a user's<br />

browser.\nFor your information, the observed version of CMS Made Simple is: \n %L<br />

Solution: Upgrade to CMS Made Simple 1.7.1 or later.<br />

CVE-2010-1482<br />

OrangeHRM < 2.5.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5531 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to multiple attack vectors\n\nThe remote host<br />

is running OrangeHRM, a human resource management system written in PHP. The<br />

reported version of OrangeHRM is: \n %L \n\nThe version of OrangeHRM installed on the<br />

remote host fails to sanitize input to multiple forms which would allow an attacker to insert<br />

HTML, execute cross-site-scripting (XSS) attacks, execute SQL injection attacks, and<br />

execute arbitrary commands. In all instances, code/commands would be executed with the<br />

privileges of the web process.<br />

Solution: Upgrade to version 2.5.5 or higher when available. In the interim, either disable the service<br />

or only allow trusted users access to the application.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Drupal Context module < 6.x-2.0-rc4 HTML Injection<br />

<strong>PVS</strong> ID: 5532 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 1481

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!