27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

users:\ndex_init()\nsnb_en_init()\nsnb_ru_init()\nspell_init()\nsyn_init()\n\nAn attacker<br />

calling these functions can submit queries that lead to compromise of confidential data or<br />

execution of arbitrary code on the remote database server.<br />

Solution: Upgrade to PostgreSQL 8.0.3 or higher.<br />

CVE-2005-1410<br />

Golden FTP < 2.53 USER Traversal File Access<br />

<strong>PVS</strong> ID: 2877 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18194<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the Golden FTP Server. This version of Golden FTP is vulnerable to a<br />

remote directory traversal flaw. An authenticated attacker can retrieve sensitive files from<br />

outside the FTP server directories by using a '../' type query.<br />

Solution: Upgrade to version 2.53 or higher.<br />

CVE-2005-1484<br />

Mac OS X Multiple Vulnerabilities (<strong>Security</strong> Update 2005-005)<br />

<strong>PVS</strong> ID: 2878 FAMILY: Operating System Detection RISK: HIGH NESSUS ID:18189<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is missing <strong>Security</strong> Update 2005-005. This security\nupdate contains security fixes for the<br />

following application :\n\n- Apache\n- AppKit\n- AppleScript\n- Bluetooth\n- Directory<br />

Services\n- Finder\n- Foundation\n- HelpViewer\n- LDAP\n- libXpm\n- lukemftpd\n-<br />

NetInfo\n- ServerAdmin\n- sudo\n- Terminal\n- VPN<br />

Solution: Apply <strong>Security</strong> Update 2005-005.<br />

CVE-2005-1343<br />

Invision Board Multiple XSS and SQL Injection<br />

<strong>PVS</strong> ID: 2879 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18201<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Invision Board, a CGI suite designed to set up a<br />

bulletin board system on the remote web server. This version of Invision Board is<br />

vulnerable to a Cross-Site Scripting (XSS) flaw where attackers can supply malicious script<br />

code to the 'act' parameter of the index.php script. An attacker exploiting this flaw would<br />

need to be able to convince a user to browse to a malicious URI. Successful exploitation<br />

would result in the theft of confidential materials (such as authentication cookies). In<br />

addition, the remote application is vulnerable to a remote SQL Injection attack. An attacker<br />

exploiting this flaw would send a malformed query to the application. The query would<br />

include reserved SQL characters and syntax. Successful exploitation would result in the<br />

Family Internet Services 744

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!