27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 2.16.478 or higher.<br />

CVE-2005-1189<br />

Info2WWW < 1.2.2.9-23 Argument XSS<br />

<strong>PVS</strong> ID: 2843 FAMILY: CGI RISK: LOW NESSUS ID:18086<br />

Description: The remote host is running Info2WWW, an application that generates informational web<br />

pages. This version of Info2WWW is vulnerable to a remote cross-site scripting (XSS)<br />

attack. An attacker exploiting this flaw would typically need to convince a user to browse<br />

to a malicious URI. Success exploitation would result in the theft of confidential materials<br />

(such as authentication cookies).<br />

Solution: Upgrade to version 1.2.2.9-23 or higher.<br />

CVE-2004-1341<br />

MPlayer < 1.0pre7 Multiple Remote Heap-based Overflows<br />

<strong>PVS</strong> ID: 2844 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of Mplayer, a multimedia video and audio application, that is vulnerable to<br />

several heap-based overflows that may allow an attacker to execute arbitrary code on the<br />

remote system.<br />

Solution: Upgrade to version 1.0pre7 or higher.<br />

CVE-2005-1195<br />

SunOne Web Proxy < 3.6 SP7 Unspecified Remote Buffer Overflows<br />

<strong>PVS</strong> ID: 2845 FAMILY: Web Servers RISK: HIGH NESSUS ID:18114<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the SunOne Web Proxy. This version is reported vulnerable to a number of remote<br />

buffer overflows. Alledgedly, successful exploitation would result in the attacker executing<br />

arbitrary commands on the remote SunOne Web Proxy server.<br />

Solution: Upgrade to version 3.6 SP7 or higher.<br />

CVE Not available<br />

Coppermine Gallery SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 2846 FAMILY: CGI RISK: HIGH NESSUS ID:18101<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures. There is<br />

a flaw in this version of Coppermine Gallery. Specifically, the remote user's cookie is not<br />

Family Internet Services 734

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!