27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PHPGroupWare Multiple XSS and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2457 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host seems to be running PHPGroupWare, a groupware system<br />

implemented in PHP. This version is reported to be vulnerable to a cross-site scripting issue<br />

and a SQL injection vulnerability. An attacker may gain access to unauthorized information<br />

or may steal cookie-based authentication credentials from a legitimate user by sending the<br />

user a malformed link to this web site.<br />

Solution: No solution is known at this time.<br />

CVE-2004-1383<br />

MPlayer < 1.0pre5try2 Get_Header Remote Client-Side Buffer Overflow<br />

<strong>PVS</strong> ID: 2458 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of Mplayer, a multimedia video and audio application, that contains bugs<br />

that may allow a malicious server to overwrite a buffer and execute code.<br />

Solution: Upgrade to Mplayer 1.0pre5try2 or higher.<br />

CVE Not available<br />

Xine-Lib < 1.0-rc8 Remote Client-Side Buffer Overflow<br />

<strong>PVS</strong> ID: 2459 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Xine, an open-source multimedia player. It is reported that versions up to 1.0 rc7 are<br />

vulnerable to a buffer overflow. An attacker may craft a malicious multimedia file that may<br />

execute arbitrary code on the remote host if played with Xine.<br />

Solution: Upgrade to Xine 1.0-rc8 or higher.<br />

CVE Not available<br />

PHP < 4.3.10 / 5.0.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2460 FAMILY: Web Servers RISK: HIGH NESSUS ID:15973<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running a version of PHP which is older than 5.0.3 or 4.3.10.\nThe remote version of this<br />

software is vulnerable to various security issues that may, under certain circumstances,<br />

allow attackers to execute arbitrary code on the remote host, provided that they can pass<br />

arbitrary data to some functions or bypass safe_mode. The reported version of PHP is: \n<br />

%L<br />

Family Internet Services 624

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!