27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 2115 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running a version of the Serv-U FTP Server that has an<br />

hidden default administration account. This account is reported to be hard-coded but it can<br />

be used only from the loopback interface. It may permit a local attacker to log into the site<br />

maintenance interface.<br />

Solution: No solution is known at this time.<br />

CVE-2004-2532<br />

Mozilla Browser Input Type HTML Tag Unauthorized Access<br />

<strong>PVS</strong> ID: 2116 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is using a vulnerable version of Mozilla, an open-source web browser. It is<br />

reported that Mozilla versions prior 1.7.1 present an issue in the INPUT tag. An attacker<br />

may craft a malicious web page that may secretly upload files readable by the victim on a<br />

remote computer.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0759<br />

Subversion (SVN) < 1.0.3 Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2117 FAMILY: Generic RISK: HIGH NESSUS ID:12261<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Subversion, an open-source file management product. According to the version<br />

number, the remote system is vulnerable to at least one remote buffer overflow.<br />

Solution: Upgrade to version 1.0.3 or higher.<br />

CVE-2004-0397<br />

Sympa < 4.1.2 wwsympa.fcgi List Master Authentication Bypass<br />

<strong>PVS</strong> ID: 2118 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running wwsympa.fcgi, a<br />

web interface for the Sympa mailing list manager. It is reported that this version<br />

of Sympa may permit an attacker to bypass the list master authentication in<br />

order to create unauthorized mailing list.<br />

Solution: Upgrade to version 4.1.2 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 527

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!