27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote host is running ZoneAlarm, a personal firewall for the Windows platform. The<br />

client is running a version of ZoneAlarm which is less than 5.5.094.000. This version of<br />

ZoneAlarm is reported vulnerable to an undisclosed vulnerability and the vendor has<br />

released version 5.5.094.000 to remediate risk.<br />

Solution: Upgrade to version 5.5.094.000 or higher.<br />

CVE Not available<br />

PHP-Calendar < 0.10.3 includes/search.php SQL Injection<br />

<strong>PVS</strong> ID: 2864 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHP-Calendar, a web-based calendar application<br />

written in PHP. This version of PHP-Calendar is vulnerable to a remote SQL injection<br />

attack. Specifically, the search.php script fails to parse out SQL-reserved characters and<br />

would allow a remote attacker to read or write data as well as potentially execute arbitrary<br />

code on the remote database.<br />

Solution: Upgrade to version 0.10.3 or higher.<br />

CVE-2005-1397<br />

Claroline Multiple Remote Vulnerabilities<br />

<strong>PVS</strong> ID: 2865 FAMILY: CGI RISK: HIGH NESSUS ID:18165<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running an older version of Claroline, an online e-learning<br />

software. This version is vulnerable to multiple attacks that include, but are not limited to,<br />

remote buffer overflow, HTML injection, Cross-Site Scripting (XSS), and SQL injection.<br />

An attacker exploiting these flaws can gain access to confidential data, run arbitrary code,<br />

and execute malicious code within victim browsers.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1376<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Oracle Application Server Web Cache OHS mod_access Authentication Bypass<br />

<strong>PVS</strong> ID: 2866 FAMILY: Web Servers RISK: LOW NESSUS ID:18181<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw which allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Oracle Application Server. This version<br />

is reported vulnerable to an authentication bypass attack. Specifically, administrators may<br />

restrict access using the 'mod_access' Oracle module. However, attackers may utilize the<br />

Oracle Webcache service in order to bypass these restrictions. An attacker exploiting this<br />

flaw would be able to elevate privileges and potentially gain access to administrative<br />

functions or confidential data.<br />

Family Internet Services 740

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!