27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote web server was observed responding to a web request with HTML code that<br />

consisted of a 'href' link obfuscated within the HTML comments. The 'href' link observed<br />

was: \n %L \n\nThe request which generated this response was: \n%P<br />

Solution: Whenever possible, remove information that attackers may find useful for future attacks.<br />

CVE Not available<br />

Xine-lib < 1.0 RC6a Heap and Stack Overflows<br />

<strong>PVS</strong> ID: 2304 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflows.\n\nThe remote<br />

host is using a software linked again xine-lib, an open-source multimedia library. It is<br />

reported that versions up to 1.0 rc6a are vulnerable to multiple overflows in the DVD,<br />

subtitles and Video-CD modules. An attacker may craft a malicious multimedia file that<br />

may execute arbitrary code on the remote host if played with a xine-lib based software.<br />

Solution: Upgrade to Xine-lib 1.0 RC6a or higher.<br />

CVE-2004-1476<br />

YaBB Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2305 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of YaBB. It is reported that versions up to and including 1<br />

Gold SP 1.3.1 are prone to multiple security flaws including administrator authentication<br />

bypassing and cross-site scripting issues. By crafting a malformed URL, an attacker may<br />

issue administrator commands or steal cookie-based authentication credentials from an<br />

unsuspecting user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2402<br />

Google Toolbar HTML Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2306 FAMILY: Web Clients RISK: HIGH NESSUS ID:17656<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a vulnerable version of Google Toolbar. It is reported that versions prior to<br />

2.0.114.2 are vulnerable to an HTML injection issue in the ABOUT.HTML page. An<br />

attacker may inject malicious script code in this page. An unsuspecting user viewing this<br />

page will have the malicious code executed within a less restricted context. The reported<br />

version of GoogleToolbar is: \n %L<br />

Family Internet Services 580

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!