27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ModernBill < 4.3.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2812 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18008<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running ModernBill (%L ), a web hosting application written in PHP. This<br />

version of ModernBill is vulnerable to several remote attacks. There are Cross-Site<br />

Scripting (XSS) flaws in the 'aid' and 'c_code' parameters of the orderwiz.php script. An<br />

attacker exploiting these flaws can inject script code into a URI. If the attacker can<br />

convince a user into browse a malicious URI, there is a risk of confidential data being sent<br />

back to the attacker. In addition, there is a flaw in the news.php script that would allow an<br />

attacker to execute arbitrary server-side code on the web server. Versions of ModerBill<br />

prior to 4.3.3 are also vulnerable to a SQL injection flaw. Successful exploitation would<br />

allow a remote attacker the ability to execute arbitrary code on the database server.<br />

Solution: Upgrade to version 4.3.3 or higher.<br />

CVE-2005-1053<br />

DC++ < 0.674 File Content Manipulation<br />

<strong>PVS</strong> ID: 2813 FAMILY: Peer-To-Peer File Sharing<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18012<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running DC++, an open source peer-to-peer client. The remote host is<br />

reported to be prone to a vulnerability where attackers can append data to file transfers. The<br />

details of this flaw are, at the time, undocumented. It is believed that a successful attack<br />

would result in arbitrary code being run on the client machine (after a download is<br />

complete).<br />

Solution: Upgrade to version 0.674 or higher.<br />

CVE-2005-1089<br />

Pine < 4.63 rpdump Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 2814 FAMILY: SMTP Clients RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nPine versions 4.62 and below suffer from a vulnerability with the<br />

rpdump utility. Rpdump ships with Pine by default. This version of rpdump is vulnerable to<br />

a local file-access race condition. An attacker exploiting this flaw would need local access<br />

to the machine as well as the knowledge of when a user was using rpdump. Successful<br />

exploitation results in elevation of privileges.<br />

Solution: Upgrade to version 4.63 or higher.<br />

CVE-2005-1066<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 725

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!