27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running phpBB. There is a flaw in the remote software that may allow anyone to inject<br />

arbitrary SQL commands in the login form. An attacker may exploit this flaw to bypass the<br />

authentication of the remote host or execute arbitrary SQL statements against the remote<br />

database.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

CCProxy < 6.3 Logging Function HTTP GET Request Remote Overflow<br />

<strong>PVS</strong> ID: 2412 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:15774<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running CCProxy, an application proxy supporting many protocols (Telnet, FTP, WWW,<br />

and more). There is a buffer overflow in the remote version of this software that may allow<br />

an attacker to execute arbitrary code on the remote host with the privileges of the user<br />

running the proxy.<br />

Solution: Upgrade to CCProxy 6.3 or higher.<br />

CVE-2004-2416<br />

Digital Mappings Systems POP3 Server Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2413 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Digital Mappings Systems POP3 server which is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw will be able to execute code on the remote host<br />

by sending a malicious username string.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1533<br />

WebGUI < 6.2.9 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2414 FAMILY: CGI RISK: HIGH NESSUS ID:15787<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running WebGUI, a content management framework.\n\nThe remote version<br />

of this software is vulnerable to an undisclosed vulnerability.<br />

Solution: Upgrade to WebGUI 6.2.9 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHP-Kit < 1.6.04 Multiple Input Validation Vulnerabilities<br />

Family Internet Services 611

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!