27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

malicious email. Successful exploitation would result in the client running code within their<br />

browser that would seem to be originating from the Mailreader server.<br />

Solution: Upgrade to version 2.3.36 or higher.<br />

CVE-2005-0386<br />

BayTech RPC3 Telnet Daemon Authentication Bypass<br />

<strong>PVS</strong> ID: 2781 FAMILY: Generic RISK: HIGH NESSUS ID:17663<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running a version of Bay Technical Associates RPC3<br />

Telnet Daemon that lets a user bypass authentication by sending a special set of keystrokes<br />

at the username prompt. Since BayTech RPC3 devices provide remote power management,<br />

this vulnerability enables an attacker to cause a denial of service, shut down the device<br />

itself and any connected devices.<br />

Solution: No solution is known at this time.<br />

CVE-2005-0957<br />

PHP Remote getimagesize DoS<br />

<strong>PVS</strong> ID: 2782 FAMILY: Web Servers RISK: HIGH NESSUS ID:18033<br />

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running a version of PHP that is older than 4.3.11 or 5.0.4. This version<br />

contains a bug that can be triggered when the getimagesize() function processes malicious<br />

IFF or JPEG image files. An attacker exploiting this flaw would be able to present an image<br />

to the function that would cause the function to go into an infinite loop by processing a<br />

negative file size. A successful exploit would result in the loss of system availability for<br />

valid users. There is also a reported flaw in the way that PHP handles data being passed to<br />

the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS)<br />

attack. Other flaws impacting this version of PHP have been reported; however, details<br />

have not been released. The reported version of PHP is: \n %L<br />

Solution: Upgrade to 4.3.11, 5.0.4 or higher.<br />

CVE-2005-1043<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MaxWebPortal < 1.36 XSS and SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2783 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nMaxWebPortal is a web portal that utilizes a backend SQL or MySQL database.<br />

This version of MaxWebPortal is vulnerable to remote cross-site scripting (XSS) and SQL<br />

injection flaws. An attacker exploiting this flaw would typically need to be able to convince<br />

a user to browse a malicious URI. A successful attack would result in the theft of<br />

potentially confidential client data (cookies, authentication credentials, and more) or<br />

Family Internet Services 716

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!