27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2004-2225<br />

BugPort < 1.134 Remote Privilege Escalation<br />

<strong>PVS</strong> ID: 2346 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of BugPort. BugPort is a PHP application that is used to track<br />

bugs and development items within an organization. According to its version number, this<br />

instance is vulnerable to a remote attack where a remote user can upload a malicious script<br />

or file in order to escalate privileges.<br />

Solution: Upgrade to at least version 1.134 or higher.<br />

CVE Not available<br />

Vypress < 4.0 First Message Field Overflow<br />

<strong>PVS</strong> ID: 2347 FAMILY: Peer-To-Peer File Sharing RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Vypress Messenger, %L , that is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw would only need to be able to send a message or<br />

file to the Vypress service (listens on port 7777 by default). A successful exploit would<br />

allow the remote attacker the ability to overwrite and control the program's memory.<br />

Solution: Upgrade to version 4.0 or higher.<br />

CVE-2004-1574<br />

<strong>Network</strong>Active Web Server Resource Exhaustion DoS<br />

<strong>PVS</strong> ID: 2348 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running <strong>Network</strong>Active Web Server. <strong>Network</strong>Active Web Server is a small<br />

application that can be downloaded and run on any Windows desktop. An attacker<br />

exploiting this flaw would need to be able to connect to the server (typically on port 80)<br />

and send long requests. By sending enough requests, the attacker would be able to exhaust<br />

the resources of the Web server and cause it to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

IBM DB2 < 8.2 Multiple Vulnerabilities (2)<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2349 FAMILY: Database RISK: HIGH NESSUS ID:15486<br />

Family Internet Services 592

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!