27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote SFTP server is affected by an authentication bypass<br />

vulnerability.\n\nThe remote host is running Serv-U File Server, an FTP/SFTP Server for<br />

Windows. For your information, the observed version of Serv-U is %L.\n\nVersions of<br />

Serv-U earlier than 10.3.0.1 are potentially affected by a security bypass vulnerability in<br />

the SFTP module. By supplying a valid username and blank password, an attacker can gain<br />

unauthorized access to the affected application.<br />

Solution: Upgrade to Serv-U version 10.3.0.1 or later.<br />

CVE Not available<br />

FileCOPA < 6.01.01 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5713 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:50811<br />

Description: Synopsis :\n\nThe remote FTP server is vulnerable to a directory traversal attack.\n\nThe<br />

remote host is running FileCOPA, an FTP Server for Windows. For your information, the<br />

observed version of FileCOPA is %L.\n\nVersions of FileCOPA earlier than 6.01.01 are<br />

potentially affected by an unspecified directory traversal attack. An attacker, exploiting this<br />

flaw, could download arbitrary files subject to the privileges of the user running the<br />

affected application.<br />

Solution: Upgrade to FileCOPA 6.01.01 or later.<br />

CVE Not available<br />

FreeNAS < 0.7.2 Revision 5543 Command Execution Vulnerability<br />

<strong>PVS</strong> ID: 5714 FAMILY: CGI RISK: HIGH NESSUS ID:50510<br />

Description: Synopsis :\n\nA web application on the remote host is affected by an arbitrary command<br />

execution vulnerability.\n\nThe remote host is running FreeNAS, a network attached<br />

storage distribution based on FreeBSD. For your information, the observed version of<br />

FreeNAS on the remote running on the remote host is %L.\n\nVersions of FreeNAS earlier<br />

than 0.7.2 Revision 5543 are potentially affected by a remote command execution<br />

vulnerability because the application fails to restrict access to the 'exec_raw.php' script. A<br />

remote, unauthenticated attacker can pass arbitrary commands through the script's 'cmd'<br />

parameter and have them executed with root privileges.<br />

Solution: Upgrade to FreeNAS 0.7.2 Revision 5543 or later.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iPhone/iPad iOS < 4.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 5715 FAMILY: Mobile Devices RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 1545

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!