27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2004-0815<br />

W-Agora Multiple Input Validation Vulnerabilities<br />

<strong>PVS</strong> ID: 2339 FAMILY: Web Servers RISK: HIGH NESSUS ID:15402<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running W-Agora, a web-based forum management software<br />

written in PHP.\nThere are multiple input validation flaws in the remote version of this<br />

software :\n\n - There is an SQL injection vulnerability in the file 'redir_url.php' that may<br />

allow an attacker to execute arbitrary SQL statements in the remote database ;\n - There is a<br />

cross site scripting issue that may allow an attacker to steal the cookies of the legitimate<br />

users of the remote site by sending them a specially malformed link ;\n - There is an HTTP<br />

response splitting vulnerability that may also allow an attacker to perform cross-site<br />

scripting attacks against the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1565<br />

Kerio MailServer < 6.0.3 Unspecified Code Execution<br />

<strong>PVS</strong> ID: 2340 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15404<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Kerio MailServer prior to 6.0.3.\n\nThere is an undisclosed flaw in the<br />

remote version of this server that might allow an attacker to execute arbitrary code on the<br />

remote host.<br />

Solution: Upgrade to Kerio MailServer 6.0.3 or higher.<br />

CVE-2004-2441<br />

Local POP Account Detection<br />

<strong>PVS</strong> ID: 2341 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: <strong>PVS</strong> observed at least one POP session originating from this server address. <strong>PVS</strong><br />

maintains the most recently seen POP account used to download email to this server.<br />

The detected user login string was:\n %L<br />

realtime<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

AJ-Fork Permission Weakness Information Disclosure<br />

<strong>PVS</strong> ID: 2342 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 590

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!