27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bugzilla 3.2.x earlier than 3.2.9, 3.4.x earlier than 3.4.9, and 3.6.x earlier than 3.6.3 are<br />

potentially affected by multiple vulnerabilities :\n\n - By inserting a certain string into a<br />

URL, it is possible to inject both headers and content to any browser that supports "Server<br />

Push". (CVE-2010-3172)\n\n - The Charts system generates graphs with predictable names<br />

into the 'graphs/' directory, which can also be browsed to see its contents.<br />

(CVE-2010-3764)\n\n - YUI 2.8.1 is vulnerable to a cross-site scripting vulnerability in<br />

certain .swf files.<br />

Solution: Upgrade to Bugzilla 3.2.9, 3.4.9, 3.6.3 or later.<br />

CVE-2010-3764<br />

Microsoft Executable in Transit Detection<br />

<strong>PVS</strong> ID: 5701 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be compromised\n\nThis service appears to send a<br />

Microsoft Windows executable when a connection to it is established. This may be<br />

evidence of some malware which are known to propagate in this manner<br />

realtime<br />

Solution: Check the host and disinfect / reinstall it if necessary.<br />

CVE Not available<br />

SmartFTP Directory Traversal Vulnerability<br />

<strong>PVS</strong> ID: 5702 FAMILY: FTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host has a FTP client installed that is vulnerable to a directory<br />

traversal attack\n\nThe remote host is running SmartFTP, a FTP client for Windows. For<br />

your information, the observed version of SmartFTP is %L\n\nVersions of SmartFTP<br />

earlier than 4.0.1124 are potentially affected by a directory traversal vulnerability. An<br />

attacker, exploiting this flaw, could trick a user into downloading a malicious file into a<br />

user's Startup folder.<br />

Solution: Upgrade to SmartFTP 4.0.1124 or later.<br />

CVE-2010-3099<br />

SmartFTP filename Unspecified Vulnerability<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 5703 FAMILY: FTP Clients RISK: HIGH NESSUS ID:50575<br />

Description: Synopsis :\n\nThe remote host has a FTP client installed that is affected by an unspecified<br />

vulnerability.\n\nThe remote host is running SmartFTP, a FTP client for Windows. For<br />

your information, the observed version of SmartFTP is %L\n\nVersions of SmartFTP<br />

earlier than 4.0.1142 are potentially affected by an unspecified vulnerability relating to<br />

filenames.<br />

Family Internet Services 1541

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!