27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple flaws which impact confidentiality,<br />

integrity, and availability.\n\nThe remote host is running an IBM DB/2 Universal Database<br />

Server. It is reported that versions up to 8.2 may be vulnerable to multiple remote<br />

overflows. IBM DB/2 passes database versions over the network. <strong>PVS</strong> has noted that the<br />

DB/2 version is less than 8.2.<br />

Solution: Upgrade to version 8.2 or higher.<br />

CVE-2005-0417<br />

PHPLinks SQL Injection<br />

<strong>PVS</strong> ID: 2350 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPLinks. PHPLinks is a PHP application that<br />

gathers 'links'. This version is prone to a bug where an attacker can cause the server to<br />

execute arbitrary script code. Further, the application is reported to be prone to SQL<br />

Injection flaws. An attacker exploiting either of these flaws would be able to run commands<br />

with the privileges of the Web Server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Jetty Web Server < 4.2.4 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2351 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Jetty prior to version 4.2.4. Jetty is a Java web server that is downloadable<br />

off of the Internet and is currently bundled with some IBM applications. An attacker<br />

exploiting this flaw would only need to be able to request web pages from the Jetty server.<br />

A successful attack would allow the attacker to navigate outside the web directories and<br />

download potentially confidential data.<br />

Solution: Upgrade to version 4.2.4 or higher.<br />

CVE-2004-2478<br />

PHP-Fusion Database Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2352 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: The remote host is running a version of PHP-Fusion that is prone to a SQL injection issue.<br />

In versions prior to and including 4.01, an attacker may be able to manipulate and obtain<br />

potentially confidential data. In addition, there is also a flaw in the way that this version of<br />

PHP-Fusion handles upload code. An attacker exploiting this flaw would be able to upload<br />

malicious code that would then be run by unsuspecting web users. Finally, there is a flaw in<br />

the way that PHP-Fusion handles user-supplied input via the forum_search.php script. An<br />

Family Internet Services 593

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!