27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the GLD Greylisting server. A Greylisting server is one that forces SMTP<br />

servers to re-send an email. By forcing a re-send, SPAM can be greatly throttled down.<br />

Versions of GLD prior to 1.5 are prone to multiple remote attack vectors.<br />

Solution: Upgrade to version 1.5 or higher.<br />

CVE-2005-1100<br />

EGroupWare < 1.0.0.007 Attachment Information Disclosure<br />

<strong>PVS</strong> ID: 2819 FAMILY: CGI RISK: HIGH NESSUS ID:15719<br />

Description: Synopsis :\n\nThe remote email client may attach unrequested attachments to an outgoing<br />

email.\n\nThe remote host is running eGroupWare, a web-based groupware solution. It is<br />

reported that versions prior 1.0.0.007 are prone to an information disclosure vulnerability.<br />

Specifically, if a user composes an email with an attachment and then cancels the email, the<br />

attachment will be attached and sent with the next outbound email.<br />

Solution: Upgrade to eGroupWare 1.0.0.007 or higher.<br />

CVE-2005-1202<br />

PHPBB2 < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2820 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18573<br />

Description: The remote host is running phpBB2, a web-based bulletin board written in PHP. This<br />

version of phpBB2 is vulnerable to multiple Cross-Site Scripting (XSS) attacks. An<br />

attacker exploiting this flaw would need to be able to entice a user into browsing a<br />

malicious URI. Successful exploitation would lead to the attacker executing code within the<br />

client browser possibly resulting in the theft of confidential data.<br />

Solution: Upgrade to version 2.0.14 or higher.<br />

CVE-2005-1115<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHP Photo Album < 2.0.14 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2821 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Photo Album, a phpBB module that enables users to<br />

easily share photo albums via the internet. This version of Photo Album is vulnerable to a<br />

SQL injection attack within the 'mode' parameter of the album_search.php script. An<br />

attacker exploiting this flaw would send a malformed query to the album_search.php script<br />

which, when processed, would give the attacker the ability to read and/or modify data. In<br />

addition, the attacker may be able to execute arbitrary code. Photo Album is also vulnerable<br />

to a Cross-Site Scripting (XSS) attack within the 'sid' parameter of the album_cat.php and<br />

album_comment.php scripts. An attacker exploiting this flaw would need to convince a<br />

Family Internet Services 727

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!