27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

MySQL < 4.0.21 Remote GRANT Privilege Escalation<br />

<strong>PVS</strong> ID: 2370 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15477<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of MySQL that is older than<br />

version 4.0.21.\nIt is vulnerable to a flaw that may allow an attacker to gain access to<br />

unauthorized databases. An attacker can exploit this vulnerability if he has GRANT<br />

privileges on databases containing '_'.<br />

Solution: Upgrade to version 4.0.21 or higher.<br />

CVE-2004-0957<br />

PuTTY < 0.56 Remote SSH2_MSG_DEBUG Buffer Overflow<br />

<strong>PVS</strong> ID: 2371 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a vulnerable version of PuTTY, a SSH client built for Linux and UNIX variants as<br />

well as Microsoft Windows operating systems. It has been reported that PuTTY does not<br />

safely handle SSH2_MSG_DEBUG messages. As a result, an attacker may be able to<br />

exploit it by setting up a mallicious SSH server. The version of PuTTY installed on the<br />

remote host is: %L<br />

Solution: Upgrade to PuTTY 0.56 or higher.<br />

CVE-2004-1008<br />

Bugzilla Authentication Bypass and Information Disclosure<br />

<strong>PVS</strong> ID: 2372 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15562<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote server is running Bugzilla, a bug tracking system. There is a<br />

flaw in the remote installation of Bugzilla that may allow an attacker to bypass<br />

authentication or to get access to private bug reports.<br />

Solution: Upgrade to version 2.14.5, 2.16.2, 2.17.3 or higher.<br />

CVE-2004-1634<br />

Opera < 7.55.0 Cross-Domain Dialog Box Spoofing<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2373 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 599

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!