27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UBB.threads < 6.5.1.1 editpost.php SQL Injection<br />

<strong>PVS</strong> ID: 2699 FAMILY: CGI RISK: HIGH NESSUS ID:18098<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL injection attack.\n\nThe remote host<br />

is running a version of UBB.threads that fails to sufficiently sanitize the 'Number'<br />

parameter before using it in SQL queries in the editpost.php script. As a result, a remote<br />

attacker can pass malicious input to database queries, potentially resulting in data exposure,<br />

modification of the query logic, or even data modification or attacks against the database<br />

itself.<br />

Solution: Upgrade to UBB.threads version 6.5.1.1 or higher.<br />

CVE-2005-0726<br />

PlatinumFTP Server < 2.0 Remote Format String DoS<br />

<strong>PVS</strong> ID: 2700 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17321<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PlatinumFTP Server. The remote server is vulnerable to a remote<br />

Denial of Service (DoS) attack. Specifically, a remote user attempting to authenticate 50+<br />

times with a user ID that includes '\\' will cause the server to fail. A successful attack would<br />

render the FTP server useless for valid users.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2005-0779<br />

Apache Tomcat AJP12 Protocol Remote DoS<br />

<strong>PVS</strong> ID: 2701 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17322<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nIt may<br />

be possible to freeze or crash the remote Tomcat web server by sending a specially crafted<br />

HTTP request. An attacker exploiting this flaw would only need to be able to send HTTP<br />

requests to the server. Successful exploitation would result in the web server being made<br />

unavailable to valid users.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0808<br />

PHP-Nuke paBox Module Hidden Parameter XSS<br />

<strong>PVS</strong> ID: 2702 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17336<br />

Family Internet Services 693

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!