27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

OpenText FirstClass HTTP Daemon Search DoS<br />

<strong>PVS</strong> ID: 2450 FAMILY: Web Servers RISK: HIGH NESSUS ID:15934<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running OpenText FirstClass, a web based unified messaging system.\nThe<br />

remote version of this software is vulnerable to an unspecified Denial of Service attack that<br />

may allow an attacker to disable this service remotely.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-2496<br />

IlohaMail < 0.8.14-RC1 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2451 FAMILY: CGI RISK: HIGH NESSUS ID:15935<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe target is running<br />

at least one instance of IlohaMail version 0.8.13 or earlier.\nThe remote version of this<br />

software is vulnerable to an unspecified vulnerability announced by the vendor.<br />

Solution: Upgrade to IlohaMail version 0.8.14RC1 or higher.<br />

CVE-2004-2500<br />

phpMyAdmin < 2.6.1-pl1 Remote Command Execution<br />

<strong>PVS</strong> ID: 2452 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running phpMyAdmin, an open-source software<br />

written in PHP to handle the administration of MySQL over the Web.\nThe remote version<br />

of this software is vulnerable to arbitrary command execution due to a lack of user-supplied<br />

data sanitization.\nIn addition, the remote host is vulnerable to multiple remote Cross-Site<br />

Scripting (XSS) flaws. An attacker exploiting these flaws would need to be able to<br />

convince a user into clicking on a malicious URL. Upon successful exploitation, the<br />

attacker would be able to steal credentials or execute code within the browser.\nThirdly, the<br />

remote host is vulnerable to a flaw in the way that it handles user-supplied variables that<br />

are used within included files. An attacker exploiting this flaw would pass malicious data to<br />

the server that the server would then include within the executing script code. A successful<br />

exploit would result in the attacker being able to execute arbitrary code on the server.<br />

Solution: Upgrade to phpMyAdmin 2.6.1-pl1 or higher.<br />

CVE-2005-0543<br />

phpDig < 1.8.5 Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 2453 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15949<br />

Family Internet Services 622

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!