27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2006-1705<br />

Software602 602Pro LAN SUITE < 2004.0.05.0509 Directory Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 2883 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running the 602Pro LAN SUITE, an application that provides web, FTP, telnet,<br />

DNS, RealAudio, SSL services and proxying. This version of 602Pro LAN SUITE is<br />

vulnerable to a remote directory traversal attack within the 'mail' scripts 'A' parameter. An<br />

attacker exploiting this flaw would simply supply a typical '../../' directory traversal query to<br />

the 'A' parameter. Successful exploitation would give the attacker access to any files on the<br />

remote system. This introduces a loss of confidentiality.<br />

Solution: Upgrade to version 2004.0.05.0509 or higher.<br />

CVE-2005-1423<br />

Apache htdigest realm Variable Overflow<br />

<strong>PVS</strong> ID: 2884 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

appears to be running a version of Apache, an open source web server. This version of<br />

Apache is vulnerable to a flaw in the 'htdigest' utilility. Specifically, a long user-supplied<br />

realm will cause an overflow and execution of arbitrary code. This issue is not considered a<br />

local flaw, as the program is not run setuid. An attacker exploiting this flaw would need to<br />

find a vulnerable Apache Web server that was making a call to 'htdigest' via a CGI script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-1344<br />

WebStar Mail < 5.4.1 Tomcat Plugin Remote Overflow<br />

<strong>PVS</strong> ID: 2885 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running WebSTAR Mail, a mail server for Mac OS X that offers its services via a web<br />

interface. WebStar runs with the Tomcat plugin enabled by default. This version of<br />

WebStar is vulnerable to an attack against the Tomcat plugin. Specifically, a long,<br />

user-supplied URI will result in a buffer overflow. Successful exploitation would lead to<br />

the execution of arbitrary code on the remote server.<br />

Solution: Upgrade to a version greater than 5.4.1.<br />

CVE-2005-1507<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 746

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!