27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ipswitch IMail Server < 8.14.0 Delete Command Buffer Overflow<br />

<strong>PVS</strong> ID: 2408 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of Ipswitch IMail that is older than version 8.14.0. The remote version of<br />

this software is vulnerable to a buffer overflow when it processes the argument of the<br />

'delete' command. An attacker may exploit this flaw to execute arbitrary code on the remote<br />

host.<br />

Solution: Upgrade to IMail 8.14.0 or higher.<br />

CVE-2004-1520<br />

PowerPortal index.php index_page Parameter SQL Injection<br />

<strong>PVS</strong> ID: 2409 FAMILY: CGI RISK: HIGH NESSUS ID:15760<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is using PowerPortal, a content management system written in<br />

PHP. A vulnerability exists in the remote version of this product that may allow a remote<br />

attacker to perform a SQL injection attack against the remote host. An attacker may exploit<br />

this flaw to execute arbitrary SQL statements against the remote database and possibly to<br />

execute arbitrary commands on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

phpScheduleIt < 1.0.1 Reservation.class.php Arbitrary Reservation Modification<br />

<strong>PVS</strong> ID: 2410 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15772<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running phpScheduleIt, a web-based reservation<br />

system written in PHP. According to its banner, this version is reported vulnerable to an<br />

undisclosed issue that may allow an attacker to modify or delete phpScheduleIt<br />

reservations.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

CVE-2004-2469<br />

phpBB Login Form SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2411 FAMILY: CGI RISK: HIGH NESSUS ID:15780<br />

Family Internet Services 610

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!