27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

punBB < 1.2.5 Multiple SQL Injection and Authentication Bypass Vulnerabilities<br />

<strong>PVS</strong> ID: 2715 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17363<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML injection attack.\n\nThe remote<br />

host is running punBB, a web-based bulletin board. This version of punBB ( %L ) is<br />

vulnerable to multiple remote HTML injection attacks. Specifically, failure to correctly<br />

parse the 'email' and 'Jabber' variables of the profile page leads to a condition where<br />

attackers can insert bogus HTTP headers and content into a client browser session. In order<br />

to affect such an attack, the attacker would typically need to be able to entice a remote user<br />

into perusing a malicious URI. A successful attack would lead to a loss of confidential data<br />

(such as authentication or state cookies) or the execution of malicious code within the<br />

browser.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2005-0818<br />

Lysator < 2.0.1 LSH Unspecified Remote DoS<br />

<strong>PVS</strong> ID: 2716 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:17352<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Lysator's LSH, a version of Secure Shell (SSH) that is available for<br />

Unix-like platforms. This version of LSH is reported vulnerable to a Denial of Service<br />

(DoS) attack.<br />

Solution: Upgrade to version 2.0.1 of LSH (when available).<br />

CVE Not available<br />

MailEnable < 1.8.1 mailto Remote Format String Overflow<br />

<strong>PVS</strong> ID: 2717 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:17364<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running a version of MailEnable Professional which is reported to be prone to a<br />

remote format string vulnerability. Specifically, the application fails to properly parse the<br />

SMTP 'mailto:' request. An attacker exploiting this flaw would send a malformed query to<br />

the server which, upon being parsed, would either crash the remote host or possibly execute<br />

arbitrary commands on the remote host.<br />

Solution: Upgrade to version 1.8.1 or higher.<br />

CVE-2005-1015<br />

Looking Glass <strong>Network</strong> Tool Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2718 FAMILY: Policy NESSUS ID:Not Available<br />

Family Internet Services 698

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!