27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote SFTP service is vulnerable to a directory traversal attack.\n\nThe<br />

remote host is running XLight FTP server with the SFTP service enabled. For your<br />

information, the observed version of XLight SFTP is %L.\n\nVersions of XLight FTP<br />

server 3.x earlier than 3.6.0 are potentially affected by a directory traversal vulnerability in<br />

the SFTP service. A remote authenticated attacker, exploiting this flaw, can read arbitrary<br />

files on the affected host.<br />

Solution: Upgrade to XLight FTP Server 3.6 or later.<br />

CVE-2010-2695<br />

Bugzilla 3.7.x < 3.7.2 Information Disclosure Vulnerability<br />

<strong>PVS</strong> ID: 5594 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:47748<br />

Description: Synopsis :\n\nThe remote web server is hosting an application that is affected by an<br />

information disclosure vulnerability.\n\nThe remote web server is hosting Bugzilla, a<br />

web-based bug tracking application. For your information, the observed version of Bugzilla<br />

is %L.\n\nVersions of Bugzilla 3.7.x earlier than 3.7.2 fail to restrict access to bugs created<br />

with the inboud email interface (email_in.pl) or with the 'Bug.create' method in the<br />

WebServices interface to the 'mandatory; or 'Default' groups. This could allow bug<br />

information to become publicly available instead of being restricted to certain groups.<br />

Solution: Upgrade to Bugzilla 3.7.2 or later.<br />

CVE Not available<br />

Database Client Login Detection<br />

<strong>PVS</strong> ID: 5595 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is logging in with the following credentials<br />

Solution: N/A<br />

realtimeonly<br />

CVE Not available<br />

Database Client Login Detection<br />

<strong>PVS</strong> ID: 5596 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is logging in with the following credentials<br />

realtimeonly<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1502

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!