27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running SparkleBlog, a web blog. An attacker exploiting this<br />

flaw would only need to be able to craft a web request against the web server using the<br />

'journal.php' script.\nThe remote version is: %L<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Squid Proxy < 2.5.STABLE8 Gopher, WCCP, and Cache Poisoning Vulnerabilities<br />

<strong>PVS</strong> ID: 2537 FAMILY: Web Servers RISK: HIGH NESSUS ID:16190<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote Squid caching proxy, according to its version number, is vulnerable to several<br />

security flaws :\n\n- There is a buffer overflow issue when handling the reply of a rogue<br />

gopher site. To exploit this issue, an attacker would need to use the remote proxy to visit a<br />

specially setup gopher site generating malformed replies \n\n- There is a denial of service<br />

vulnerability in the WCCP code of the remote proxy. To exploit this flaw, an attacker<br />

would need to guess the IP of the WCCP router used by the proxy and spoof a malformed<br />

UDP packet using the router IP address. There are several flaws in the way that the Squid<br />

proxy caches pages.\nAn attacker exploiting these flaws would be able to poison the<br />

Squid\ncache.<br />

Solution: Upgrade to Squid 2.5.STABLE8 or higher.<br />

CVE-2005-0241<br />

NETGEAR Router Detection<br />

<strong>PVS</strong> ID: 2538 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is a NETGEAR VPN router. A VPN is a connection protocol that allows<br />

users or companies to connect to remote networks seamlessly.\nThe NETGEAR version<br />

number is: %L<br />

Solution: Ensure that you are running the latest firmware for this version.<br />

CVE Not available<br />

NETGEAR Router Log Viewer XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2539 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running a NETGEAR VPN router with Firmware version 2.4. A VPN is a<br />

connection protocol that allows users or companies to connect to remote networks<br />

seamlessly. Firmware version 2.4 of the NETGEAR router is reported to be prone to code<br />

injection and/or cross-site scripting (XSS) attacks.<br />

Family Internet Services 646

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!