27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 5752 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:51861<br />

Description: Synopsis :\n\nThe remote mail server is affected by a local privilege escalation<br />

vulnerability.\n\nThe remote host is running Exim, a message transfer agent. For your<br />

information, the observed version of Exim is %L.\n\nVersions of Exim earlier than 4.74 are<br />

potentially affected by a local privilege escalation vulnerability. Attackers can exploit this<br />

flaw to append arbitrary data to files through symbolic link attacks. Successfully exploiting<br />

this issue allows local attackers with 'exim' run-time privileges to perform certain actions<br />

with superuser privileges, leading to a complete compromise of an affected computer. Note<br />

that this issue only affects Exim on Linux.<br />

Solution: Upgrade to Exim 4.74 or later.<br />

CVE-2011-0017<br />

HP Performance Insight Detection<br />

<strong>PVS</strong> ID: 5753 FAMILY: CGI RISK: INFO NESSUS ID:Not Available<br />

Description: Synopsis : \n\nA performance monitoring application was detected on the remote web<br />

server.\n\nThe web interface for HP OpenView Performance Insight was detected on the<br />

remote host. This software helps assess the availability and performance of network<br />

services. For your information, the observed version of HP OpenView Performance Insight<br />

was : \n %L<br />

Solution: N/A<br />

CVE Not available<br />

HP OpenView Performance Insight Server Backdoor Account<br />

<strong>PVS</strong> ID: 5754 FAMILY: CGI RISK: HIGH NESSUS ID:51850<br />

Description: Synopsis :\n\nThe remote host contains a web application that has a hidden account.\n\nThe<br />

installation of HP OpenView Performance Insight on the remote host allows the use of a<br />

hidden account for logging in. The 'hch908v' user, hardcoded in the<br />

com.trinagy.security.XMLUserManager class, is hidden and has administrative privileges.<br />

A remote, unauthenticated attacker could exploit this by logging in as the hidden user,<br />

giving them administrative access to the Performance Insight installation. After gaining<br />

administrative access to the web application, escalation of privileges may be possible.<br />

Solution: Apply the hotfix referenced in the HP advisory.<br />

CVE-2011-0276<br />

CouchDB < 1.0.2 Cross Site Scripting Issue<br />

<strong>PVS</strong> ID: 5755 FAMILY: Database<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:51923<br />

Family Internet Services 1560

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!