27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2475<br />

Rhinosoft DNS4Me Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2307 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Rhinosoft DNS4Me, a dynamic DNS software for Windows<br />

systems. DNS4Me includes a small web server that can serve static content. It is reported<br />

that this embedded web server is prone to multiple security flaws including remote denial<br />

of service and cross-site scripting. An attacker can crash the server by sending an<br />

abnormally long request or steal cookie-based authentication credentials by sending a<br />

malformed link to this site.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1691<br />

Tutos Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2308 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to SQL injection<br />

and cross-site scripting attacks.\n\nThe remote host is running a vulnerable version of<br />

Tutos. It is reported that Tutos 1.1.20040414 is prone to multiple input validation<br />

weaknesses. Due to insufficient user input validation, an attacker may carry out SQL<br />

injection or cross-site scripting attacks on this host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2162<br />

Apache < 2.0.52-dev 'Satisfy' Directive Access Control Bypass<br />

<strong>PVS</strong> ID: 2309 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Apache Web Server 2.0.51. It is reported that<br />

this version of Apache is vulnerable to an access control bypass attack. This issue occurs<br />

when using the 'Satisfy' directive. An attacker may gain unauthorized access to restricted<br />

resources if access control relies on this directive.<br />

Solution: Upgrade to version 2.0.52-dev or higher.<br />

CVE-2004-0811<br />

Alt-N MDaemon Multiple Buffer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 581

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!