27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\n<strong>PVS</strong> observed that the remote webserver is running the AJ-Fork<br />

service version %L .\nThis version of AJ-Fork is vulnerable to a remote attack wherein the<br />

critical system files used by AJ-Fork can be read and written by any anonymous remote<br />

user. All versions of AJ-Fork up to and including version 167 are reported vulnerable.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1573<br />

Bblog Blog Software Detection<br />

<strong>PVS</strong> ID: 2343 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\n<strong>PVS</strong> observed that the remote webserver is running Bblog. Bblog is a web blog<br />

that has, in the past, been vulnerable to SQL injection and Cross-Site Scripting (XSS)<br />

vulnerabilities.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1570<br />

RealPlayer Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2344 FAMILY: Web Clients RISK: HIGH NESSUS ID:15395<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of RealPlayer that is vulnerable to multiple undisclosed remote buffer<br />

overflows.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0190<br />

Mozilla/Firefox Linux Installation Arbitrary File Deletion<br />

<strong>PVS</strong> ID: 2345 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15408<br />

Description: Synopsis :\n\nThe remote Firefox browser can be tricked into deleting potentially sensitive<br />

files.\n\nThe remote host appears to be running Mozilla or Firefox. It is reported that<br />

versions up to 0.10.1 of Firefox are prone to an improper file permission issue when<br />

bookmarking a 'link'. An attacker crafting a malicious link can cause Firefox to overwrite<br />

or delete files within the download directory.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

Family Internet Services 591

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!