27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

passwords can be easily derived from their hash using a dictionary-based brute<br />

force attack.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

SAFE TEAM Regulus Customers Accounts Password Hash Disclosure<br />

<strong>PVS</strong> ID: 2272 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host seems to be running Regulus, a<br />

web accounting software implemented in PHP. It is reported that every version of<br />

Regulus up to and including 2.2-95 are prone to a customer accounts information<br />

disclosure vulnerability. The 'Update your password' action from the<br />

'custchoice.php' script permits any user to get the password hash for a given<br />

username or customer ID. The password hash, computed using DES 56 bit, is<br />

included in a hidden tag of the HTML file served by the web server. Therefore<br />

customer passwords can be easily derived from their hash using a dictionary-based<br />

brute force attack.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

SAFE TEAM Regulus Customer Statistics Connection Log Information Disclosure<br />

<strong>PVS</strong> ID: 2273 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host seems to be running Regulus, a web accounting software<br />

implemented in PHP. It is reported that every version of Regulus up to and including 2.2-95<br />

are prone to a customer statistics information disclosure vulnerability. The 'To see your<br />

connection logs' action from the 'custchoice.php' script permits any user to see the<br />

connection statistics for a given username or customer ID without requiring valid<br />

credentials.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2004-09-07)<br />

<strong>PVS</strong> ID: 2274 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing Apple's <strong>Security</strong> Update 2004-09-07. This security update fixes the<br />

following components: CoreFoundation, IPSec, Kerberos, libpcap, lukemftpd,<br />

<strong>Network</strong>Config, OpenLDAP, OpenSSH, PPPDialer, rsync, Safari and tcpdump<br />

Family Internet Services 571

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!