27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2005-1700<br />

Citrix MetaFrame Server Detection<br />

<strong>PVS</strong> ID: 2809 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running Citrix MetaFrame Server. Citrix MetaFrame is a<br />

web-based application that allows and facilitates connections to other systems. There is a<br />

flaw in many versions of Citrix MetaFrame that allows authenticated users to elevate access<br />

by creating macros within Microsoft Office documents.<br />

Solution: Ensure that this instance of Citrix MetaFrame is allowed with respect to corporate policies<br />

and guidelines. In addition, ensure that the Citrix MetaFrame server is patched to the latest<br />

revision.<br />

CVE Not available<br />

Autocomplete Not Disabled for 'Password' Field<br />

<strong>PVS</strong> ID: 2810 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote web application server may be prone to a policy<br />

violation.\n\nThe remote web server is hosting a form that calls for a user password.<br />

However, the 'Autocomplete' functionality has not been disabled for the password. When<br />

Autocomplete is enabled, the client machine will store the form data for future use. This<br />

can be very dangerous as attackers can target confidential data that has been stored on the<br />

client computer. The page that is hosting the form is located at: \n%P\n\nThe form field<br />

that should have Autocomplete disabled is: \n %L >\n<br />

Solution: Set Autocomplete<br />

CVE Not available<br />

KDE KMail HTML Email Information Spoofing<br />

<strong>PVS</strong> ID: 2811 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running a vulnerable email client.\n\nThe remote client is<br />

running Kmail, an email client for Unix and Unix-like operating systems. This version is<br />

vulnerable to a content-parsing flaw within the HTML handlers. Specifically, a client with<br />

HTML enabled may be sent a malicious email that is able to overlap portions of the<br />

displayed email. This can be used to convince users to perform web-based tasks that have<br />

unexpected results.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0404<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 724

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!