27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: No solution is known at this time.<br />

CVE-2005-0700<br />

Oracle Database Server UTL_FILE Directory Traversal File Access<br />

<strong>PVS</strong> ID: 2680 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17654<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files.\n\nThe remote host appears to be running a vulnerable version of Oracle<br />

Database Server. An authenticated user can craft SQL queries such that they would be able<br />

to retrieve any file on the system. An attacker exploiting this flaw would need a valid<br />

account and would need to be able to connect to the Oracle service (typically on port 2972).<br />

The attacker would retrieve and/or potentially modify confidential data on the target Oracle<br />

server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0701<br />

Yahoo! Messenger < 6.0.0.1921 Multiple DoS<br />

<strong>PVS</strong> ID: 2681 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Yahoo Instant Messenger that is reported vulnerable to<br />

a remote buffer overflow. An attacker exploiting this flaw would craft a malicious 'away'<br />

message and then entice an unsuspecting user to attempt to contact them. When the user<br />

receives the malicious 'away' message, the overflow would be triggered and code would be<br />

executed remotely. In addition, this version of Yahoo! Messenger is vulnerable to a remote<br />

Denial of Service (DoS) attack via a malformed YMSGR: URI.<br />

Solution: Upgrade to version 6.0.0.1921 or higher.<br />

CVE-2005-1618<br />

PHP-Fusion < 5.01 BBcode IMG Tag XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2682 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running a version of PHP-Fusion which is vulnerable to a script injection flaw. The<br />

'fusion_core.php' script is reportedly vulnerable to an attack where an attacker can inject<br />

HTML and script code through the 'BBCode IMG' tag. An attacker exploiting this flaw<br />

would create a malicious URI link and then convince an unsuspecting user to click on the<br />

link. A successful attack would yield potentially confidential data (cookies, credentials) as<br />

well as potentially execute malicious code within the context of the vulnerable server.<br />

Family Internet Services 687

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!