27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2004-0493<br />

Vortex Portal Content Management System Multiple Remote File Inclusion<br />

<strong>PVS</strong> ID: 2745 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is running %L , a content-management system for gaming. This version of Vortex is<br />

vulnerable to an 'include' file injection attack. Specifically, the 'act' variable of 'content.php'<br />

and 'index.php' is not properly sanitized by the Vortex application. An attacker exploiting<br />

this flaw would be able to include arbitrary malicious code within a URI. The attacker<br />

would then need to be able to convince a client to browse to the URI. A successful attack<br />

would result in the client browser executing malicious code within the context of the<br />

Vortex application.<br />

Solution: Ensure that this application is allowed within corporate policies and guidelines.<br />

CVE-2005-0879<br />

WU-FTPD FTP Server File Globbing Remote DoS<br />

<strong>PVS</strong> ID: 2746 FAMILY: FTP Servers RISK: HIGH NESSUS ID:17602<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a WU-FTPD FTP server. This version of WU-FTPD is vulnerable to<br />

a remote Denial of Service (DoS). Specifically, by sending a LIST request with many '*'<br />

characters causes the remote server to crash. This introduces a risk to availability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0256<br />

XMB Forum < 1.9.8 SQL Injection and XSS Vulnerabilities<br />

<strong>PVS</strong> ID: 2747 FAMILY: CGI RISK: HIGH NESSUS ID:17608<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running XMB Forum. There is flaw in the version this host is using that may allow an<br />

attacker to perform a cross-site scripting attack against this host. An attacker exploiting this<br />

flaw would need to be able to convince a user to browse a malicious URI. Successful<br />

exploitation would result in a potential loss of confidential data (cookies, authentication<br />

credentials, and more.).\n\nIn addition, there is a flaw in the way that XMB handles<br />

user-supplied data sent to the 'u2u.inc.php' script. An attacker sending malformed queries<br />

can inject SQL commands that are executed on the database server. This can lead to the<br />

reading or writing of data and, in some cases, the attacker can execute arbitrary system<br />

commands.<br />

Solution: Upgrade to version 1.9.8 or higher.<br />

CVE-2005-0885<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 707

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!