27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

een discovered with this version of PBLang. Specifically, files outside of the web root<br />

may be displayed to remote users. This sort of attack is known as a 'directory-traversal'<br />

attack, and would allow an attacker to craft a remote query such that the returned data<br />

would contain potentially confidential data (/etc/passwd file, HTTPD configuration files,<br />

and more.)<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0630<br />

ProZilla < 1.3.7.4 Location Header Format String<br />

<strong>PVS</strong> ID: 2644 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote client is vulnerable to a remote overflow.\n\nThe remote host is<br />

using Prozilla, a download accelerator for Linux and Unix systems. The remote version of<br />

this software contains a flaw in the way that it handles server HTTP headers. Specifically,<br />

Prozilla does not properly handle format strings, which would allow the remote attacker to<br />

execute arbitrary code on the client (Prozilla) machine. An attacker exploiting this flaw<br />

would need to be able to convince a user to browse a malicious website. In addition, the<br />

remote host is reported vulnerable to a remote buffer overflow. The details of this overflow<br />

have not been made public at this time.<br />

Solution: Upgrade to version 1.3.7.4 or higher.<br />

CVE-2005-2961<br />

Cyrus IMAPD < 2.2.12 Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2645 FAMILY: IMAP Servers RISK: HIGH NESSUS ID:17208<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

banner, the remote Cyrus IMAPD server is vulnerable to multiple remote buffer overflow<br />

attacks. An attacker exploiting these flaws would need to be able to communicate with the<br />

IMAPD server (usually on TCP port 143). A successful attack would result in the attacker<br />

executing arbitrary code on the IMAPD server.<br />

Solution: Upgrade to version 2.2.12 or higher.<br />

CVE-2005-0546<br />

Fedora YUM Updater Detection<br />

<strong>PVS</strong> ID: 2646 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running Fedora YUM updater.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 676

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!