27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote ProFTPd server is as old or older than 1.2.10.\nIt is possible to<br />

determine which user names are valid on the remote host based on timing analysis attack of<br />

the login procedure.\nAn attacker may use this flaw to set up a list of valid usernames for a<br />

more efficient brute-force attack against the remote host.<br />

Solution: Upgrade to version 1.2.11 or higher.<br />

CVE-2004-1602<br />

Mantis < 0.19.1 Multiple Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 2394 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host appears to be running a vulnerable version of Mantis, a bug<br />

tracker web application written in PHP. It is reported that versions up to 0.19.0 are prone to<br />

multiple information disclosure vulnerabilities flaws that may allow an attacker to view<br />

stats of all projects or receive information from a project he was removed.<br />

Solution: Upgrade to Mantis version 0.19.1 or higher.<br />

CVE Not available<br />

SlimFTPd < 3.16 Multiple Command Remote Overfow<br />

<strong>PVS</strong> ID: 2395 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a vulnerable version of SlimFTPd, a small FTP server for Windows. It<br />

is reported that versions up to 3.15 are prone to a buffer overflow vulnerability that may<br />

allow an attacker to execute arbitrary code on this host. A attacker needs a valid FTP<br />

account on the server to exploit this vulnerability.<br />

Solution: Upgrade to SlimFTPd version 3.16 or higher.<br />

CVE-2004-2418<br />

Pavuk < 0.9.31 Multiple Unspecified Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2396 FAMILY: Web Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is using a version of Pavuk, a web spider, that is<br />

vulnerable to multiple unspecified buffer overflows. An attacker can construct a malicious<br />

website that is designed to trigger the vulnerability and run arbitrary code on the client<br />

machine.<br />

Family Internet Services 606

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!