27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 5.01 or higher.<br />

CVE-2005-0692<br />

XOOPS Arbitrary Avatar File Upload<br />

<strong>PVS</strong> ID: 2683 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running XOOPS, a web-portal software written in PHP. This version of<br />

XOOPS is vulnerable to a flaw where remote attackers can upload arbitrary executable<br />

code and then execute the code via a web request. An attacker exploiting this flaw would be<br />

able to execute arbitrary code within the context of the web server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0743<br />

ArGoSoft FTP Server DELE Buffer Overflow<br />

<strong>PVS</strong> ID: 2684 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the ArGoSoft FTP Server. This version of ArGoSoft FTP Server is vulnerable to a<br />

flaw when parsing a malicious DELE command from an authenticated (or anonymous)<br />

user. An attacker exploiting this flaw would be able to execute arbitrary code on the remote<br />

FTP server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0696<br />

YaBB < 2.1 YaBB.pl username Parameter XSS<br />

<strong>PVS</strong> ID: 2685 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17305<br />

Description: The remote host is using the YaBB web forum software. This version of YaBB is<br />

vulnerable to a cross-site scripting (XSS) attack. Exploiting the XSS flaws may enable an<br />

attacker to inject arbitrary script code into the browser of unsuspecting users. A successful<br />

attack would potentially allow the attacker the ability to view confidential data (cookies,<br />

authentication data, and more.) or compromise the integrity of the local system via the web<br />

browser.<br />

Solution: Upgrade to YaBB 2.1 or higher.<br />

CVE-2005-0741<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

paFileDB < 3.2 XSS and SQL Injection Vulnerabilities<br />

Family Internet Services 688

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!