27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is running an application that is vulnerable to multiple<br />

flaws.\n\nThe remote host is running ZoneAlarm, a personal firewall for the Windows<br />

platform. The client is running a version of ZoneAlarm that is less than 5.5.062.011. This<br />

version of Zonealarm is prone to at least one vulnerability that could, if exploited, damage<br />

the integrity of the firewall.<br />

Solution: Upgrade to version 5.5.062.011 or higher.<br />

ZoneAlarm Detection<br />

CVE-2005-0114<br />

<strong>PVS</strong> ID: 2722 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running ZoneAlarm, a personal firewall for the Windows platform.<br />

Solution: Ensure that you are running the latest version of Zonealarm and that Zonealarm is<br />

supported with respect to corporate policies and guidelines.<br />

CVE Not available<br />

RunCMS highlight.php Information Disclosure<br />

<strong>PVS</strong> ID: 2723 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running RunCMS, a web-based messaging system. This<br />

version of RunCMS is vulnerable to a remote information disclosure flaw. Specifically, a<br />

malformed query to the highlight.php script can result in RunCMS sending back<br />

confidential database information. This information could include user IDs and passwords.<br />

An attacker exploiting this flaw would need to have knowledge regarding the installation<br />

path of the RunCMS program. A successful exploit would result in the loss of confidential<br />

data.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0828<br />

Icecast Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2724 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a vulnerable version of Icecast, an open-source streaming server. This version is<br />

reported prone to at least two (2) remote attacks. The first attack involves a content-parsing<br />

flaw within the XSL parser. An attacker exploiting this flaw would need to be able to<br />

convince an administrator into downloading and installing a malicious XSL file. The<br />

second attack allows a remote attacker to download source code by appending a '.' to a<br />

request to a XSL resource. An attacker exploiting this second flaw would only need to be<br />

able to send queries to the Icecast server. Successful exploitation would result in the<br />

Family Internet Services 700

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!