27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Policy - RealArcade Gaming Client Detection<br />

<strong>PVS</strong> ID: 2605 FAMILY: Generic RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote host is running RealArcade games on the local system.<br />

RealArcade is a piece of software that facilitates the downloading or interactive playing of<br />

computer games.<br />

Solution: Ensure that such activity is allowed under corporate policies and guidelines.<br />

CVE Not available<br />

ArGoSoft Mail Server < 1.8.7.4 HTML Injection<br />

<strong>PVS</strong> ID: 2606 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16364<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the ArGoSoft Mail Server. This<br />

version of ArGoSoft is prone to several vulnerabilities. Specifically, an attacker can use a<br />

directory traversal attack to gain access to sensitive data. Further, an attacker can add or<br />

delete folders. Note: Both of these vulnerabilities would require that the attacker have a<br />

valid user account.<br />

Solution: Upgrade to version 1.8.7.4 or higher.<br />

CVE Not available<br />

GNU Mailman < 2.1.6 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2607 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16339<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data\n\nThe remote host is running GNU Mailman, a web based software<br />

to manage mailing lists. There is a flaw in this version of Mailman that would allow a<br />

remote attacker to retrieve potentially confidential data. Specifically, the CGI script<br />

'private.py' does not properly parse user-supplied data and would allow an attacker to read<br />

any file on the operating system that was readable by the web process.<br />

Solution: Upgrade to version 2.1.6 or higher.<br />

CVE-2005-0202<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apache mod_python < 3.1.4 Information Disclosure<br />

<strong>PVS</strong> ID: 2608 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 665

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!