27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running eZ or eZphotoshare. It is reported that this software is<br />

vulnerable to a remote denial of service. An attacker may remotely crash eZphotoshare or<br />

eZ by establishing over 80 simultaneous connections to the server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

PHPGroupWare < 0.9.16.003 Wiki Module XSS<br />

<strong>PVS</strong> ID: 2269 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host appears to be running PHPGroupWare, a groupware system implemented in<br />

PHP. This version is reported to be vulnerable to a cross-site scripting issue in the Wiki<br />

module. An attacker may steal cookie-based authentication credentials from a legitimate<br />

user by sending a malformed link to this web site.<br />

Solution: Upgrade to PHPGroupWare 0.9.16.003 or higher.<br />

CVE-2004-0875<br />

TYPSoft FTP Server Multiple DoS<br />

<strong>PVS</strong> ID: 2270 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be running TYPSoft FTP Server. It is reported that version up to and including<br />

1.11 are prone to multiple vulnerabilities.\n\n - A denial-of-service vulnerability when an<br />

authenticated user issues two 'RETR' request in a row, without actualy downloading the<br />

files.\n\n - A denial-of-service vulnerability when handling data passed to the 'APPE' and<br />

'DELE' commands via the same socket connection.\n\n - A denial-of-service vulnerability<br />

when handling a malformed 'ABORT' command.<br />

Solution: No solution is known at this time.<br />

CVE-2009-4105<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

SAFE TEAM Regulus Staff Accounts Password Hash Disclosure<br />

<strong>PVS</strong> ID: 2271 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host seems to be running Regulus, a<br />

web accounting software implemented in PHP. It is reported that every version of<br />

Regulus up to and including 2.2-95 are prone to a staff accounts information<br />

disclosure vulnerability. Any user may query the 'staffile' from the web server and<br />

be served. This file contains information about the staff accounts including<br />

password hashes which are computed using DES 56 bit. Therefore staff users<br />

Family Internet Services 570

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!