27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

properly parsed for SQL special characters. An attacker exploiting this flaw would send a<br />

malicious cookie to the Coppermine application. Successful exploitation would result in the<br />

attacker being able to read and write sensitive database data as well as potentially executing<br />

arbitrary code on the remote database.<br />

Solution: Upgrade to Coppermine greater than 1.3.2.<br />

CVE-2005-1225<br />

ArGoSoft Mail Server Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2847 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18140<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the ArGoSoft Mail Server. This version of<br />

ArGoSoft is prone to a remote, unauthenticated access flaw. Specifically, as ArGoSoft does<br />

not require authentication prior to serving the 'addnew' script, an unauthenticated user can<br />

perform administrative tasks. Successful exploitation would lead to the attacker being able<br />

to add accounts and escalate their privileges on the remote server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1283<br />

Woltlab Burning Board XSS / SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 2848 FAMILY: CGI RISK: HIGH NESSUS ID:18251<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Woltlab Burning Board, a web bulletin board written in PHP. This version of<br />

Burning Board is vulnerable to a remote Cross-Site Scripting (XSS) attack. An attacker<br />

exploiting this flaw would typically need to convince a user to browse to a malicious URI.<br />

Success exploitation would result in the theft of confidential materials (such as<br />

authentication cookies).\n\nThis version of Woltlab is also vulnerable to a remote SQL<br />

injection\nattack. An attacker exploiting this flaw would send a malformed\n'email' form<br />

query to the 'verify_email()' function. Succesful exploitation\nwould result in the attacker<br />

being able to read or write confidential\ndata. In some instances, the attacker may be able<br />

to execute arbitrary\ncode on the remote database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1642<br />

phpBB < 2.0.15 admin_forums.php XSS<br />

<strong>PVS</strong> ID: 2849 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18124<br />

Family Internet Services 735

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!