27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Opera that is prone to a security flaw where a malicious<br />

website can spoof a cross-domain dialog box that may entice the local user to enter<br />

information based on the bogus domain. For example, if the malicious website were to<br />

spoof a trusted domain, the user may enter confidential information into the dialog box.<br />

These sort of exploits are commonly referred to as 'Phishing' scams.<br />

Solution: Install Opera 7.55.0 or higher.<br />

CVE Not available<br />

Konqueror < 3.2.2-2 Cross-Domain Dialog Box Spoofing<br />

<strong>PVS</strong> ID: 2374 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Konqueror that is prone to a security flaw where a<br />

malicious website can spoof a cross-domain dialog box that may entice the local user to<br />

enter information based on the bogus domain. For example, if the malicious website were<br />

to spoof a trusted domain, the user may enter confidential information into the dialog box.<br />

These sort of exploits are commonly referred to as 'Phishing' scams.<br />

Solution: Upgrade to version 3.2.2-2 or higher.<br />

CVE Not available<br />

Ability FTP Server Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2375 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Ability FTP Server. It is reported that Ability FTP Server is prone to a remote<br />

buffer overflow via the STOR command. An attacker exploiting this flaw would only need<br />

to be able to craft and send a query to the FTP server on its service port (usually 21)<br />

Solution: No solution is known at this time.<br />

CVE-2004-1626<br />

NetCaptor Cross-Domain Dialog Spoofing<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2376 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running NetCaptor. NetCaptor is a web browser that is installed 'over'<br />

Internet Explorer, using the IE core engine while adding functionality to the GUI. This<br />

version of NetCaptor is vulnerable to a flaw where a malicious website can spoof a domain<br />

via the Dialog box. An attacker exploiting this flaw may be able to access confidential data<br />

from the client.<br />

Family Internet Services 600

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!