27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

to an information disclosure issue. An attacker may craft encoded URL request that may<br />

permit him to read files and directory outside the Icecast Server directory.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-0784<br />

Icecast < 1.3.10 print_client() Format String<br />

<strong>PVS</strong> ID: 2144 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a vulnerable version of Icecast, an open-source streaming server. It is<br />

reported that every version prior to 1.3.10 is vulnerable to a format string bug that may<br />

permit an attacker to overwrite memory at arbitrary address.<br />

Solution: Upgrade to Icecast 1.3.10 or higher.<br />

CVE-2001-0197<br />

DtMail Local Format String Privilege Escalation<br />

<strong>PVS</strong> ID: 2145 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is using DtMail, a mail user agent included in CDE, the default desktop environment<br />

for Sun Solaris. It is reported that versions of DtMail shipped with Solaris 8 and 9 are prone<br />

to a local format string issue. An local attacker may exploit this vulnerability to execute<br />

malicious code with mail group privileges.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0800<br />

WebAPP < 0.9.9.2 index.cgi Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2146 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14365<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\n The remote host is running WebAPP, an open-source web portal<br />

application written in perl. There is a flaw in the remote version of this software that may<br />

allow an attacker to read arbitrary files on the remote host with the privileges of the web<br />

server process (httpd or root).<br />

Solution: Upgrade to version 0.9.9.2 or higher.<br />

CVE-2004-1742<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Easy File Share Virtual Folders Arbitrary File Access<br />

Family Internet Services 535

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!