27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 2693 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17315<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Active WebCam, a Java program that displays real-time video camera images<br />

over the Internet. This version of Active WebCam is vulnerable to several flaws.<br />

Specifically, it is reported that Active WebCam reveals path information and file name<br />

location (within debugging information). It is also reported that requesting a URI like<br />

'http://www.somesite.com/A:\a.txt' leads to a Denial of Service (DoS) condition on the<br />

remote application.<br />

Solution: Upgrade to version 5.6 or higher.<br />

CVE-2005-0734<br />

PhotoPost Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2694 FAMILY: CGI RISK: HIGH NESSUS ID:17314<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running PhotoPost, a web-based image gallery written in PHP. This version of<br />

PhotoPost is reported to be vulnerable to multiple flaws. Specifically, the host is reported<br />

vulnerable to an access validation flaw within the 'adm-photo.php' script. An attacker<br />

exploiting this flaw would be able to upload images under the context of another user. The<br />

second flaw is a Cross-Site Scripting (XSS) vulnerability. Exploiting the XSS flaw may<br />

enable an attacker to inject arbitrary script code into the browser of unsuspecting users. A<br />

successful attack would potentially allow the attacker the ability to view confidential data<br />

(cookies, authentication data, and more) or compromise the integrity of the local system via<br />

the web browser.<br />

Solution: Upgrade to a version of PhotoPost greater than 5.00 Release Candidate 3.<br />

CVE-2005-1629<br />

Ipswitch IMail < 8.15 Hotfix 1 IMAP EXAMINE Argument Buffer Overflow<br />

<strong>PVS</strong> ID: 2695 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17311<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Ipswitch Collaboration\nSuite / Ipswitch IMail IMAP server that is<br />

prone to a buffer overflow\nwhen processing an EXAMINE command with a long<br />

argument.\nSpecifically, if an authenticated attacker sends an EXAMINE command\nwith<br />

a malformed mailbox name of 259 bytes, the attacker will overwrite the\nsaved stack frame<br />

pointer and potentially gain control of process\nexecution.<br />

Solution: Apply IMail Server 8.15 Hotfix 1 (February 3, 2005) or upgrade to a version greater<br />

than 8.15 when it becomes available.<br />

CVE-2005-0707<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 691

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!