27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 2292 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Apache. It is reported that versions prior to 2.0.51 are prone<br />

to a remote buffer overflow when parsing an URI sent over IPv6. An attacker may use this<br />

vulnerability to execute arbitrary code on the remote host or to deny service to legitimate<br />

users.<br />

Solution: Upgrade to Apache 2.0.51 or higher.<br />

CVE-2004-0786<br />

myServer < 0.7.1 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2293 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running myServer 0.7.0 or older. There is a<br />

flaw in the remote version of this software that may allow an attacker to read arbitrary files<br />

on the remote host with the privileges of the web server process using malformed URI.<br />

Solution: Upgrade to version 0.7.1 or higher.<br />

CVE-2004-2516<br />

vBulletin authorize.php x_invoice_num Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2294 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a version of vBulletin, a forum application<br />

implemented in PHP, that is vulnerable to a SQL injection issue. It is reported that versions<br />

3.0.0 through to 3.0.3 are prone to this issue. An attacker may steal content from the<br />

underlying database or attack it.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2695<br />

Mozilla / Firefox enablePrivilege Dialog Weakness<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2295 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

appears to be running Mozilla or Firefox. It is reported that versions up to and including<br />

0.9.3 of Firefox and up to and including 1.7.2 of Mozilla are prone to a security weakness<br />

in the enablePrivilege dialog that is displayed to authorize signed code execution. An<br />

attacker may display an arbitrary string in the security dialog to entice an user into<br />

executing a malicious script.<br />

Family Internet Services 577

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!