27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2004-0849<br />

GNU Radius < 1.2.94 SNMP Request Remote DoS<br />

<strong>PVS</strong> ID: 2300 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be running GNU Radius, an open-source remote authentication<br />

dial-up service implementation. The running version is vulnerable to a remote denial of<br />

service when processing certain SNMP requests. As we determined the software version<br />

using its SNMP banner, it appears that this option is being used.<br />

Solution: Upgrade to version 1.2.94 or higher.<br />

CVE-2004-0849<br />

Microsoft Internet Explorer 6 SV 1 XHTML Comment User Confirmation Bypass<br />

<strong>PVS</strong> ID: 2301 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running Internet Explorer 6 SV1, the version that is part of Windows XP SP2. It is<br />

reported that the user confirmation asked before to load client-side JavaScript and ActiveX<br />

embedded in web pages can be trivially bypassed. An attacker may run malicious script on<br />

the remote host. For your information, the reported MSIE version number was: \n %L \n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1686<br />

Snitz Forum < 3.4.05 HTTP Response Splitting<br />

<strong>PVS</strong> ID: 2302 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTTP 'response splitting'<br />

vulnerability.\n\nThe remote host appears to be running Snitz Forum, a web forum<br />

application implemented in ASP. It is reported that versions of Snitz Forum prior 3.4.0.04<br />

are prone to a HTTP response splitting vulnerability. An attacker may influence how the<br />

website is served, cached and interpreted by the means of a malformed link to the web site<br />

that would alter the server HTTP headers.<br />

Solution: Upgrade to Snitz Forum 3.4.05 or higher.<br />

CVE-2004-1687<br />

HTML Comment 'href' Link Obfuscation<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2303 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Family Internet Services 579

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!