27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

EmuLive Server4 Authentication Bypass / DoS<br />

<strong>PVS</strong> ID: 2314 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running EmuLive Server4. It is reported that versions up to and including Build 7569 are<br />

prone to an authentication bypass vulnerability and remote denial of service. An attacker<br />

may directly access the administration console to bypass the authentication or deny service<br />

to legitimate users. Note that Build 7569 is only vulnerable to the denial of service issue.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1695<br />

Subversion (SVN) Unreadable Path Metadata Information Disclosure<br />

<strong>PVS</strong> ID: 2315 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14800<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Subversion, an open-source file management<br />

product. According to the version number, the remote system is prone to an information<br />

disclosure issue. An attacker may gather information about the remote host using metadata<br />

in unreadable paths.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0749<br />

Macromedia JRun Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2316 FAMILY: Web Servers RISK: HIGH NESSUS ID:14810<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\n The remote host is<br />

running JRun, a J2EE application server running on top of IIS or Apache. There are<br />

multiple vulnerabilities in the remote version of this software :\n- The JSESSIONID<br />

variable is not implemented securely. An attacker may use this flaw to guess the session id<br />

number of other users\n- There is a code disclosure issue that may allow an attacker to<br />

obtain the contents of a .cfm file by appending ';.cfm' to the file name\n- There is a buffer<br />

overflow vulnerability if the server connector is configured in 'verbose' mode. An attacker<br />

may exploit this flaw to execute arbitrary code on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2182<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Full Revolution aspWebCalendar calendar.asp SQL Injection<br />

Family Internet Services 583

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!