27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

services, and more.\nIn addition, according to the version number, the remote host is<br />

vulnerable to a number of remote overflows.<br />

Solution: Upgrade to version 5.96 or higher.<br />

CVE-2005-4823<br />

Lighttpd < 1.3.8 CGI Source Disclosure<br />

<strong>PVS</strong> ID: 2624 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:16475<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running Lighttpd, a small webserver. This<br />

version of Lighttpd is vulnerable to a flaw where an attacker requesting a CGI script<br />

appended by a '%00' will be able to read the source of the script.<br />

Solution: Upgrade to 1.3.8 or higher.<br />

CVE-2005-0453<br />

DCP-Portal < 6.1.2 Multiple SQL Injection<br />

<strong>PVS</strong> ID: 2625 FAMILY: Web Servers RISK: HIGH NESSUS ID:16478<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running a version of DCP-Portal that is reported prone to a<br />

remote SQL injection flaw. An attacker exploiting this flaw would be able to execute<br />

commands, view data, and manipulate data by sending malformed HTTP requests to the<br />

web server.<br />

Solution: Upgrade to version 6.1.2 or higher.<br />

CVE-2005-4227<br />

PaNews Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2626 FAMILY: CGI RISK: HIGH NESSUS ID:17574<br />

Description: The remote host is running PaNews, a news management script\nwritten in PHP.\n\nThis<br />

version of PaNews is vulnerable to a Cross-Site Scripting (XSS)\nattack.\n\nAn attacker<br />

exploiting this flaw would need to be able to convince\nan unsuspecting user to visit a<br />

malicious website. Upon\nsuccessful exploitation, the attacker would be able to<br />

possibly\nsteal credentials or execute browser-side code.\n\nThe version of PaNews is also<br />

reported to be prone to several remote SQL and HTML injection attacks. An attacker<br />

exploiting these flaws would be able to potentially modify and view confidential data.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0647<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 670

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!