27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a version of 04WebServer that is older or as old as version<br />

1.42.\nThe remote version of this software is vulnerable to cross-site scripting and log<br />

injection vulnerabilities.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1513<br />

SquirrelMail < 1.4.4 decodeHeader HTML Injection<br />

<strong>PVS</strong> ID: 2401 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host allows attackers to bypass user authentication.\n\nThe<br />

remote host is running SquirrelMail, a webmail system written in PHP. Versions of<br />

SquirrelMail prior to 1.4.4 are vulnerable to an email HTML injection vulnerability. A<br />

remote attacker can exploit this flaw to gain access to users' accounts.<br />

Solution: Upgrade to SquirrelMail 1.4.4 or higher.<br />

CVE Not available<br />

Firefox < 1.0.0 IMG Tag Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2402 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15712<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is using Firefox. The remote version of this software contains a security issue<br />

that may allow an attacker to determine existence of local files, cause a DoS and steal<br />

passwords (Windows only). The security vulnerability is due to the fact that Firefox does<br />

not handle correctly tags.<br />

Solution: Upgrade to Firefox 1.0.0 or higher.<br />

CVE-2005-0150<br />

BNC < 2.9.1 getnickuserhost IRC Server Response Buffer Overflow<br />

<strong>PVS</strong> ID: 2403 FAMILY: IRC Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of BNC, an IRC proxy that is vulnerable to a remote buffer overflow. An<br />

attacker may use this issue to execute code on remote server.<br />

Solution: Upgrade to version 2.9.1 or higher.<br />

CVE-2004-1052<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 608

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!