27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Sami HTTP Server v1.0.5 Remote Overflow<br />

<strong>PVS</strong> ID: 2620 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16468<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running Sami HTTP Server v1.0.5 or older. A vulnerability has been reported<br />

for Sami HTTP server v1.0.5. An attacker may be capable of corrupting data such as return<br />

address, and thereby control the execution flow of the program. This may result in denial of<br />

service or execution of arbitrary code.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Kayako eSupport Multiple XSS<br />

<strong>PVS</strong> ID: 2621 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17598<br />

Description: The remote host is running Kayako eSupport, a web-based support and help desk<br />

application. This version of Kayako is vulnerable to a Cross-Site Scripting (XSS) attack.<br />

An attacker exploiting this flaw would need to be able to convince an unsuspecting user to<br />

visit a malicious website. Upon successful exploitation, the attacker would be able to<br />

possibly steal credentials or execute browser-side code.\nThe remote host is running %L<br />

Solution: Upgrade to a version greater than 2.3.1.<br />

CVE-2005-2463<br />

BrightStor ARCserve/Enterprise Backup Default Account<br />

<strong>PVS</strong> ID: 2622 FAMILY: Generic RISK: HIGH NESSUS ID:16390<br />

Description: Synopsis :\n\nThe remote host is configured with default or easily-guessed<br />

credentials.\n\nThe remote host is running UniversalAgent, an agent used by BrightStor<br />

ARCserve to perform backups. The remote version of this agent contains a default account<br />

with the username '\x02root\x03' and password '\x02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!