27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Comersus Default Install Script Admin Access<br />

<strong>PVS</strong> ID: 2554 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running Comersus, a web application shopping cart.<br />

This version of Comersus is vulnerable to a remote attack where anonymous users can gain<br />

administrative access by requesting a .asp script that was a part of the install process but<br />

never deleted after the install.<br />

Solution: Delete all /comersus_backoffice_install scripts. In addition, upgrade or patch according to<br />

vendor recommendations.<br />

CVE Not available<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-001)<br />

<strong>PVS</strong> ID: 2555 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is missing <strong>Security</strong> Update 2005-001. This security update contains a number<br />

of enhancements for the following programs :\n\n - at commands\n - ColorSync\n -<br />

libxml2\n - Mail\n - PHP\n - Safari\n - SquirrelMail\n<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0525<br />

ISC BIND < 8.4.6 q_usedns Array Remote Overflow DoS<br />

<strong>PVS</strong> ID: 2556 FAMILY: DNS Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16260<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS)<br />

attack.\n\nThe remote BIND DNS server is, according to its version number,<br />

vulnerable to a remote buffer overflow in the 'q_usedns' buffer. An attacker may be<br />

able to launch a denial of service attack against the remote BIND Server.<br />

Solution: Upgrade to Bind 8.4.6 or higher or the newest version of BIND 9.<br />

CVE-2005-0033<br />

ISC BIND < 8.4.6 dnssec authvalidated Crafted Packet Remote DoS<br />

<strong>PVS</strong> ID: 2557 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16261<br />

Family Internet Services 651

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!