27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is using a version of mod_ssl which is older than 2.8.10. This version is<br />

vulnerable to a flaw which may allow an attacker to successfully perform a cross-site<br />

scripting attack. *** Note that several Linux distributions (such as RedHat) patched this<br />

CGI without increasing its version number, therefore this might be a false positive.<br />

Solution: Upgrade to mod_ssl 2.8.10 or higher.<br />

CVE-2002-1157<br />

Snitz Forums < 3.4.03 register.asp Email Parameter SQL Injection<br />

<strong>PVS</strong> ID: 1530 FAMILY: CGI RISK: HIGH NESSUS ID:11621<br />

Description: Synopsis :\n\nThe remote web server contains a script which is vulnerable to a SQL<br />

injection attack.\n\nThe remote host is using Snitz Forum 2000. This set of CGI is<br />

vulnerable to a SQL injection issue which may allow an attacker to execute arbitrary<br />

commands on this host.<br />

Solution: Upgrade to version 3.4.03 or higher.<br />

CVE Not available<br />

eServ HTTP Connection Saturation Memory Leak Remote DoS<br />

<strong>PVS</strong> ID: 1531 FAMILY: Web Servers RISK: HIGH NESSUS ID:11619<br />

Description: The remote web server (eServ) contains a memory leak which may allow an attacker to<br />

disable it remotely by making a large amount of requests to this port.<br />

Solution: No solution known at this time.<br />

CVE-2003-0290<br />

Horde and IMP Test Script Disclosure<br />

<strong>PVS</strong> ID: 1532 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11617<br />

Description: The remote host is running Horde and/or IMP with the test script available to anyone. An<br />

attacker may use these to gain valuable information about the remote host.<br />

Solution: Delete all the files named 'test.php' on the remote host.<br />

CVE Not available<br />

PHP Topsites counter.php Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 1533 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:11611<br />

Family Internet Services 394

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!