27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2BGal SQL Injection<br />

CVE-2004-1318<br />

<strong>PVS</strong> ID: 2475 FAMILY: CGI RISK: HIGH NESSUS ID:16046<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack\n\nThe remote host<br />

appears to be running 2BGal, a photo gallery software written in PHP.\nThere is a flaw in<br />

the remote software which may allow anyone to inject arbitrary SQL commands, which<br />

may in turn be used to gain administrative access on the remote host.<br />

Solution: Upgrade to the latest version of this software<br />

CVE-2004-1415<br />

SHOUTcast < 1.9.5 Filename Remote Format String<br />

<strong>PVS</strong> ID: 2476 FAMILY: Web Servers RISK: HIGH NESSUS ID:16064<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running SHOUTcast server.\nThe remote version of this software is vulnerable to a<br />

format string attack that may let an attacker execute arbitrary code on the remote host by<br />

sending a malformed request to it.<br />

Solution: Upgrade to SHOUTcast 1.9.5 or higher.<br />

CVE-2004-1373<br />

Help Center Live Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2477 FAMILY: CGI RISK: HIGH NESSUS ID:18296<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote web server is running Help Center Live, a help desk<br />

application written in PHP.\nThe remote version of this software is vulnerable to various<br />

flaws that may allow an attacker to execute arbitrary commands on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1674<br />

ViewCVS < 1.0.0 HTTP Response Splitting<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2478 FAMILY: CGI RISK: HIGH NESSUS ID:16062<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a HTTP response splitting attack.\n\nThe<br />

remote host is running ViewCVS, a tool to browse CVS repositories over the web. There is<br />

a flaw in the remote ViewCVS server that may allow an attacker to steal the credentials of<br />

third-party users via an HTTP response splitting attack.<br />

Family Internet Services 629

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!