27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

vulnerable UW-IMAP server that had enabled the CRAM-MD5 authentication scheme. The<br />

attacker would then be able to log in as any valid user.\nIt is important to note that the<br />

IMAP daemon will automatically enable CRAM-MD5 if the /etc/cram-md5.pwd file exists.<br />

Solution: Upgrade or patch according to vendor recommendations. In addition, the fact that<br />

CRAM-MD5 is enabled indicates that the server is storing the IMAP passwords in<br />

plaintext. Ensure that the /etc/cram-md5.pwd file is mode 0400.<br />

CVE-2005-0198<br />

CoolForum < 0.8 SQL Injection<br />

<strong>PVS</strong> ID: 2569 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nCoolForum is a bulletin board written in PHP. This version of CoolForum is<br />

vulnerable to a remote SQL injection attack. An attacker exploiting this flaw would be able<br />

to manipulate data and execute commands on the remote system.<br />

Solution: Upgrade to version 0.8 or higher.<br />

CVE Not available<br />

WebWasher Proxy Server < 3.4 Detection<br />

<strong>PVS</strong> ID: 2570 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThere is a flaw in the remote WebWasher Proxy. The proxy, when issued a<br />

CONNECT command for 127.0.0.1 (or localhost/loopback), will comply with the request<br />

and initiate a connection to the local machine. This bypasses any sort of firewalling as well<br />

as gives access to local applications that are only bound to the loopback.\nThe version of<br />

WebWasher is %L<br />

Solution: upgrade to version 3.4 or higher.<br />

CVE-2005-0316<br />

WebWasher Proxy Server Detection<br />

<strong>PVS</strong> ID: 2571 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote host is running WebWasher, an anonymizing web proxy. A<br />

user accessing this proxy can effectively obfuscate their web traffic to possibly bypass<br />

Acceptable Use Policies..<br />

Solution: Ensure that such a proxy is authorized under corporate policies and guidelines.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 655

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!