27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Domino < 5.0.7 NSF File Request Directory Traversal File Access<br />

<strong>PVS</strong> ID: 1505 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11344<br />

Description: The remote Domino Web Server is vulnerable to a directory traversal attack. An attacker<br />

may read arbitrary files on the remote system by prepending %00%00.nsf/../ in front of<br />

their names.<br />

Solution: Upgrade to Domino 5.0.7 or higher.<br />

CVE-2001-0009<br />

dwhttpd < 4.2 GET Request Remote Format String<br />

<strong>PVS</strong> ID: 1506 FAMILY: Web Servers RISK: HIGH NESSUS ID:11075<br />

Description: The remote dwhttpd server is vulnerable to a format string attack. An attacker may use this<br />

flaw to execute arbitrary code on this host, with the privileges of the dwhttpd web server<br />

Solution: Upgrade to version 4.2 or higher.<br />

CVE Not available<br />

IMail < 7.0.6 Account Hijacking<br />

<strong>PVS</strong> ID: 1507 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11271<br />

Description: The remote host is running the IMail web interface. There is a bug in the version being run<br />

which may allow an attacker to read the mailboxes of the users by sending them a<br />

malformed HTML email containing a link to an image hosted on a rogue web server.<br />

Solution: Upgrade to IMail 7.0.6 or higher.<br />

CVE Not available<br />

LocalWeb2000 2.10 Crafted Request File Disclosure<br />

<strong>PVS</strong> ID: 1508 FAMILY: Web Servers RISK: HIGH NESSUS ID:11005<br />

Description: The remote host is running LocalWeb2000. Versions of this software up to and including<br />

2.10 allow an attacker to read normally protected files by prepending a dot in front of their<br />

name.<br />

Solution: The product is no longer supported by the vendor.<br />

CVE-2002-0897<br />

Apache mod_frontpage < 1.6.1 Remote Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 388

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!