27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Golden FTP Server < 1.93 USER Remote Overflow<br />

<strong>PVS</strong> ID: 2667 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Golden FTP Server. This version of Golden FTP is vulnerable to a remote<br />

buffer overflow when given a long USER name. An attacker exploiting this flaw would be<br />

able to execute arbitrary commands as the SYSTEM user.\nThe remote version of Golden<br />

FTP Server is %L<br />

Solution: Upgrade to version 1.93 or higher.<br />

CVE-2005-0634<br />

Typo3 < 1.4.2 cmw_linklist SQL Injection<br />

<strong>PVS</strong> ID: 2668 FAMILY: CGI RISK: HIGH NESSUS ID:17272<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Typo3, a web-based content management system.<br />

This version of Typo3 is vulnerable to a remote SQL injection attack. An attacker<br />

exploiting this flaw would send a specially crafted HTTP query to the Typo3 application.<br />

Successful exploitation would result in leaking of confidential data, modification of data,<br />

and potentially executing arbitrary commands with the full rights of the web server process.<br />

Solution: Upgrade to version 1.4.2 or higher.<br />

CVE-2005-0658<br />

Squid < 2.5.STABLE10 Set-Cookie Authentication Information Disclosure<br />

<strong>PVS</strong> ID: 2669 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may facilitate the theft of authentication data.\n\nThe remote<br />

Squid caching proxy, according to its version number,\nis vulnerable to an attack where the<br />

attacker gains access to Set-Cookie headers for another user. Such an attack would allow<br />

the attacker to gain access to resources with the credentials of another user.<br />

Solution: Upgrade to squid 2.5.STABLE10 or higher.<br />

CVE-2005-1519<br />

CProxy Directory Traversal Arbitrary File Access / DoS<br />

<strong>PVS</strong> ID: 2670 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running CProxy, a Web/Mail proxy server. This version of CProxy is vulnerable to a<br />

flaw where a remote attacker can download any file from the server (even outside the<br />

webroot) by using a '../' type of query. In addition, if the requested file is a .exe which does<br />

Family Internet Services 683

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!