27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: Upgrade to version 2.3.2 or higher.<br />

CVE-2005-1311<br />

Fastream NETFile < 7.5.0 Beta 7 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2860 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Fastream NETFile web server. This version of NETFile is vulnerable to<br />

a remote directory traversal flaw. An attacker exploiting this flaw would send a malformed<br />

request to the HTTP server. Successful exploitation would result in the attacker gaining<br />

access to confidential data outside the web server's root directory.<br />

Solution: Upgrade to version 7.5.0 Beta 7 or higher.<br />

CVE Not available<br />

NetTerm FTP Server USER Command Remote Overflow<br />

<strong>PVS</strong> ID: 2861 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18142<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running NetTerm FTP Server. All versions of NetTerm FTP server are vulnerable to a<br />

remote buffer overflow. The primary maintainers have removed netftpd.exe from all new<br />

versions of their product. An attacker exploiting this flaw would be able to execute<br />

arbitrary code on the remote FTP server.<br />

Solution: No solution is known at this time.<br />

CVE-2005-1323<br />

BEA WebLogic < 8.1 SP5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2862 FAMILY: Web Servers RISK: HIGH NESSUS ID:18365<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of BEA WebLogic Server or WebLogic Express that is prone to<br />

multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service,<br />

unauthorized access, cross-site scripting attacks, and information disclosure.<br />

Solution: Upgrade to WebLogic 8.1.0 SP5 or higher.<br />

CVE-2005-1749<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

ZoneAlarm < 5.5.094.000 Undisclosed Vulnerability<br />

<strong>PVS</strong> ID: 2863 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 739

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!