27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: N/A<br />

CVE Not available<br />

Microsoft Group Policy File Download Detection<br />

<strong>PVS</strong> ID: 5544 FAMILY: Samba RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is a Microsoft Group Policy client.<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

PHPGroupWare < 0.9.16.016 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5545 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

appears to be running PHPGroupWare, a groupware system implemented in PHP. The<br />

reported version is: %L\n\nThis version is reported to be vulnerable to a SQL injection<br />

flaw. An attacker, exploiting this flaw, would be able to execute arbitrary SQL commands<br />

against the database server. In addition, there is a local 'file-include' vulnerability which<br />

would allow a valid user the ability to modify the integrity of files used by the web server.<br />

Solution: Upgrade to PHPGroupWare 0.9.16.016 or higher.<br />

CVE-2010-0404<br />

PostgreSQL < 8.4.4/8.3.11/8.2.17/8.1.21/8.0.25/7.4.29 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5546 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote database server is vulnerable to multiple attack vectors.\n\nThe<br />

remote host is running PostgreSQL earlier than 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, or<br />

7.4.29. The reported version of PostgreSQL is %L. Such versions are potentially affected<br />

by multiple vulnerabilities.\n\n - A vulnerability in Safe.pm and PL/Perl can allow an<br />

authenticated user to run arbitrary Perl code on the database server if PL/Perl is installed<br />

and enabled. (CVE-2010-1169)\n\n - Insecure permissions on the pltcl_modules table could<br />

allow an authenticated user to run arbitrary Tcl code on the database server i PL/Tcl is<br />

installed and enabled. (CVE-2010-1170)\n\n - The application does not properly check<br />

privileges during certain RESET ALL operations, which could allow a remote<br />

authenticated ser to remove arbitrary parameter settings via ALTER USER or ALTER<br />

DATABASE statements.<br />

Solution: Upgrade to PostgreSQL 8.4.4, 8.3.11, 8.2.17, 8.1.21, 8.0.25, 7.4.29, or later.<br />

Family Internet Services 1485

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!