27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

initiate an SFTP connection to a malicious SSH server. Successful exploitation would result<br />

in PuTTY crashing or possibly executing arbitrary commands. The version of PuTTY<br />

installed on the remote host is: %L<br />

Solution: Upgrade to PuTTY 0.57 or higher.<br />

CVE-2005-0467<br />

Mambo Content Server Detection Global Variables Overwrite<br />

<strong>PVS</strong> ID: 2638 FAMILY: Web Servers RISK: HIGH NESSUS ID:18495<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Mambo Content Server, an application for generating dynamic content for<br />

web servers. The remote application is vulnerable to a flaw where remote attackers can<br />

upload malicious code. The code can then be executed by simply requesting the code via an<br />

HTTP session. The specific flaw is within the Tar.php script, which does not properly<br />

sanitize user-supplied content. Versions of Mambo through 4.5.2.3 are prone to a remote<br />

'file include' flaw. An attacker exploiting this flaw would be able to specify malicious code<br />

that would be run by the Mambo server.<br />

Solution: Upgrade to a version of Mambo higher than 4.5.2.<br />

CVE-2005-3738<br />

WebConnect Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2639 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running OpenConnect WebConnect. WebConnect is a web-based graphical user interface<br />

that gives remote users console access to mainframe, midrange, and Unix systems.<br />

WebConnect can be used to launch a Java-based telnet console that communicates over the<br />

HTTP protocol. This version of WebConnect is vulnerable to several remote attacks. The<br />

impact of the attack ranges from Denial of Service (DoS) to data compromise. An attacker<br />

exploiting these flaws would only need to be able to send HTTP requests to the web server.<br />

Successful exploitation would result in compromise of data or loss of availability.\nThe<br />

remote host is running WebConnect version %L<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2004-0465<br />

Curl < 7.13.1 NTLM Stack-based Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2640 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of curl (or libcurl) that is vulnerable to several remote buffer overflows. To<br />

exploit this vulnerability, an attacker would have to set up a rogue web server that would<br />

reply with a malicious NTLM or Kerberos authentication request. Upon successful<br />

Family Internet Services 674

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!