27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Kerio MailServer prior to 6.0.10.\n\nThere is a flaw in<br />

the remote version of this server that would allow an attacker to exhaust resources on the<br />

administrative web interface. While the details of the flaw are unknown, it is alledged that<br />

an attacker can launch the attack without any credentials and render the target service<br />

unavailable.<br />

Solution: Upgrade to Kerio MailServer 6.0.10 or higher.<br />

CVE-2005-1063<br />

MaxWebPortal < 1.3.5 Multiple SQL Injection<br />

<strong>PVS</strong> ID: 2874 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nMaxWebPortal is a web portal that utilizes a backend SQL or MySQL database.<br />

This version of MaxWebPortal is vulnerable to multiple SQL Injection flaws. An attacker<br />

exploiting these flaws would only need to be able to send HTTP queries to the remote<br />

application. A successful attack would give the attacker the ability to read and write<br />

database data as well as potentially execute arbitrary remote commands on the SQL or<br />

MySQL system.<br />

Solution: Upgrade to version 1.3.5 or higher.<br />

CVE-2005-1417<br />

Open Webmail < 2.51 20050430 Shell Escape Arbitrary Command Execution<br />

<strong>PVS</strong> ID: 2875 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18190<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands.\n\nThe remote host is running Open Webmail, an open-source perl<br />

script that gives remote users a web-based interface to email. This version of Open<br />

Webmail is vulnerable to a content-parsing flaw that would allow a remote attack to run<br />

arbitrary code on the Open Webmail server. Specifically, the application fails to parse out<br />

the '|' character which can be used to append commands to system calls.<br />

Solution: Upgrade to version 2.51 20050430 or higher.<br />

CVE-2006-3233<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PostgreSQL < 8.0.3 Incorrect Function Declaration<br />

<strong>PVS</strong> ID: 2876 FAMILY: Database RISK: NONE NESSUS ID:18202<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running PostgreSQL, an open source relational<br />

database. This version is vulnerable to a number of flaws. Specifically, the following<br />

functions are directly accessible to remote<br />

Family Internet Services 743

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!