27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running phpDig, an open-source search engine<br />

written in PHP.\nThe remote version of this software is vulnerable to a flaw that may allow<br />

an attacker to tamper with the integrity of the remote host.<br />

Solution: Upgrade to version 1.8.5 or higher.<br />

CVE Not available<br />

Citadel/UX Remote Format String<br />

<strong>PVS</strong> ID: 2454 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Citadel/UX, a BBS software for Unix systems.\nThere is a format string issue in<br />

the remote version of this software that may be exploited by an attacker to execute arbitrary<br />

commands on the remote host. The remote version of Citadel/UX is also known to be<br />

vulnerable to a buffer overflow in the way that select() function is performed.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Nullsoft Winamp Large MP4 / M4A File Remote DoS<br />

<strong>PVS</strong> ID: 2455 FAMILY: Generic RISK: LOW NESSUS ID:15952<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using WinAMP, a popular media player that handles many files format (mp3, wavs and<br />

more).\nThe remote version of this software is vulnerable to a denial of service<br />

vulnerability when it processes malformed .mp4 and .m4a files. An attacker may exploit<br />

this flaw by sending malformed files to a victim on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-1396<br />

Serendipity < 0.7.1 compat.php searchTerm Parameter XSS<br />

<strong>PVS</strong> ID: 2456 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:15914<br />

Description: The remote host is running Serendipity. Serendipity is a blogging software that is<br />

implemented in PHP. This version of Serendipity is vulnerable to a remote Cross-Site<br />

Scripting (XSS) attack.<br />

Solution: Upgrade to Serendipity 0.7.1 or higher.<br />

CVE-2004-2525<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 623

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!