27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is using GREED, a wget-like tool to fetch HTTP and FTP<br />

data from a command-line.\nThis software is unmaintained and contains multiple flaws that<br />

may allow an attacker to execute arbitrary commands on the remote host by sending<br />

malformed replies to the client requests.<br />

Solution: Discontinue the usage of this software.<br />

CVE Not available<br />

RealPlayer Unspecified Remote Buffer Overflow<br />

<strong>PVS</strong> ID: 2472 FAMILY: Web Clients RISK: HIGH NESSUS ID:14278<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

version number, the version of Realplayer is vulnerable to several remote<br />

overflows.\nRealplayer is a multimedia player. An attacker exploiting this flaw would need<br />

to be able to convince a local user into visiting a malicious URL or downloading a<br />

malicious RealPlayer media file that would execute code with the privileges of the local<br />

user.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0550<br />

ArGoSoft Mail Server < 1.8.7.0 Unspecified XSS<br />

<strong>PVS</strong> ID: 2473 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16012<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running the ArGoSoft Mail Server. It is reported that ArGoSoft Mail Server<br />

is prone to a HTML injection vulnerability. An attacker exploiting this flaw may be able to<br />

steal cookie-based authentication credentials.<br />

Solution: Upgrade to version 1.8.7.0 or higher.<br />

CVE Not available<br />

Namazu < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2474 FAMILY: CGI RISK: HIGH NESSUS ID:16045<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack\n\nThe<br />

remote host is running Namazu, a web-based search engine.\nThe remote version of this<br />

software is vulnerable to various flaws that may allow an attacker to perform a cross-site<br />

scripting attack using the remote host or to execute arbitrary code on the remote system<br />

with the privileges of the web server.<br />

Solution: Upgrade to Namazu 2.0.14 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 628

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!