27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

een reported to be prone to a cross-site scripting issue. An attacker may steal cookie-based<br />

authentication credentials from a legitimate user by sending malformed links to this site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Keene Digital Media Server Multiple Script Authentication Bypass<br />

<strong>PVS</strong> ID: 2262 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Keene Digital Media Server, a web<br />

application for Microsoft Windows designed to share media files on the Internet. This<br />

version of the software has been reported to be prone to an authentication bypass<br />

vulnerability. An attacker may access some part of the administration interface<br />

(adminmessage.kspx and adminshares.kspx) without providing proper authentication.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Ipswitch WhatsUp Gold prn.htm GET Request Remote DoS<br />

<strong>PVS</strong> ID: 2263 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nAccording to its HTTP banner, the remote host appears to be running a<br />

vulnerable version of Ipswitch WhatsUp Gold, a network management application for<br />

Microsoft Windows. It is reported that versions up to and incluing 8.03 hotfix 1 are prone<br />

to a remote denial of service vulnerability when processing certain HTTP GET requests.<br />

An attacker may deny service to legitimate users by sending a malformed GET request for<br />

the 'prn.html' file.<br />

Solution: Upgrade to WhatsUp Gold 8.03 Hotfix 3 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch WhatsUp Gold Notification Instance Name Remote Overflow<br />

<strong>PVS</strong> ID: 2264 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nAccording<br />

to its HTTP banner, the remote host appears to be running a vulnerable version of Ipswitch<br />

WhatsUp Gold, a network management application for Microsoft Windows. It is reported<br />

that versions up to and incluing 8.03 Hotfix 1 are prone to a remote buffer overflow<br />

vulnerability when processing notification instance names in the web interface. An attacker<br />

may use this vulnerability to execute arbitrary code on the remote host.<br />

Family Internet Services 568

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!