27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Hummingbird Inetd FTP Server XCWD Command Remote Overflow<br />

<strong>PVS</strong> ID: 2377 FAMILY: FTP Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Hummingbird Inetd FTP Server. It is reported that Hummingbird FTP Server is<br />

prone to a remote buffer in the XCWD command. An attacker exploiting this flaw would<br />

only need to be able to craft and send a query to the FTP server on its service port (usually<br />

21)<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2728<br />

PHPList < 2.6.5 Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2378 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPList. PHPList is an application that gathers and<br />

handles mailing and customer lists. This version is reported to be prone to multiple<br />

vulnerabilities that may include: Cross-Site scripting (XSS), SQL Injection, HTML<br />

Injection, and possibly others. An attacker exploiting these flaws would be able to run<br />

commands with the privileges of the Web Server.<br />

Solution: Upgrade to version 2.6.5 or higher.<br />

CVE-2004-2744<br />

Konqueror Cross-Domain Scripting<br />

<strong>PVS</strong> ID: 2379 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-site scripting (XSS) attack.\n\nThe<br />

remote host is using a version of Konqueror, a web browser, which is prone to a security<br />

flaw wherein a malicious website can spoof a third party domain within frames. An attacker<br />

exploiting this flaw would get the local user to 'trust' a remote spoofed domain. For<br />

example, if the malicious website were to spoof a trusted domain, the user may enter<br />

confidential information into the spoofed frame.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0746<br />

Quicktime Multiple Integer Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 601

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!