27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE Not available<br />

Konqueror < 3.1.x Sub-Frames XSS<br />

<strong>PVS</strong> ID: 1741 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using KDE Konqueror as a web client. There is a bug in the version<br />

used which may allow a rogue web server to execute JavaScript code in the context of a<br />

trusted domain. It was determined that this host is using : \n %L<br />

Solution: Upgrade to Konqueror 3.1.x or higher.<br />

CVE-2002-1151<br />

Konqueror < 3.0.3 Image Handling Overflow DoS<br />

<strong>PVS</strong> ID: 1742 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using KDE Konqueror as a web browser. There is a vulnerability in this<br />

version which may allow a rogue site to crash this browser by specifying too large of a<br />

width for the images it displays. It was determined that this host is using : \n %L<br />

Solution: Upgrade to Konqueror 3.0.3 or higher.<br />

CVE-2002-2333<br />

Wget < 1.5.4 Symlink Permission Modification<br />

<strong>PVS</strong> ID: 1743 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: The remote host is using a version of wget that contains a bug that may make it chmod<br />

downloaded symlinks when the option -N is used. An attacker may use this flaw by setting<br />

up a rogue FTP server with a symlink pointing to sensitive files. It was determined that the<br />

remote host is using : \n%L<br />

Solution: Upgrade to Wget 1.5.4 or higher.<br />

CVE Not available<br />

Wget < 1.8.3 Rogue FTP Site File Deletion<br />

<strong>PVS</strong> ID: 1744 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is using a version of wget that contains a bug that may allow a rogue FTP<br />

site being mirrored to delete arbitrary files on this host. It was determined that the remote<br />

host is using : \n%L<br />

Solution: Upgrade to version 1.8.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 443

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!