27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgarde or patch according to vendor recommendations.<br />

CVE-1999-0953<br />

RaidenHTTPd < 1.1.31 Crafted Request Remote File Access<br />

<strong>PVS</strong> ID: 2594 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running RaidenHTTPd. RaidenHTTPd is a<br />

web server that is designed for the Microsoft platform. This version of RaidenHTTPd is<br />

vulnerable to a flaw where an attacker can read any file on the web server by using the<br />

header 'Host: localhost'.\nThe remote version of RaidenHTTPd is %L<br />

Solution: Upgrade to version 1.1.31 or higher.<br />

CVE Not available<br />

3Com 3CServer FTP Server < 2.0 Remote Overflow<br />

<strong>PVS</strong> ID: 2595 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

vulnerable to several remote overflows. An attacker exploiting these flaws would need to<br />

be able to log into the FTP server and run standard FTP commands. If anonymous access is<br />

enabled, the 'Anonymous' account would be sufficient to generate the overflow on the<br />

remote machine.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2005-0277<br />

BXCP < 0.2.9.8 index.php show Parameter PHP Content Disclosure<br />

<strong>PVS</strong> ID: 2596 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to<br />

retrieve sensitive files or data.\n\nThe remote host is running BXCP. BXCP is a web<br />

application which does content management. There is a flaw in this version of<br />

BXCP that would allow an attacker to view the source code (or content) of any PHP<br />

script on the system. The flaw is due to how the index.php script handles the 'show'<br />

parameter. An attacker exploiting this flaw would be able to use a '../../' directory<br />

traversal syntax within the 'show' parameter, thereby rendering the code of any PHP<br />

script on the system.\nThe remote host is running BXCP version %L<br />

Solution: Upgrade to 0.2.9.8 or higher.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 662

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!