27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PHP Advanced Transfer Manager < 1.22 Arbitrary File Upload<br />

<strong>PVS</strong> ID: 2886 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18207<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nAccording to its<br />

banner, the version of PHP Advanced Transfer Manager installed on the remote host allows<br />

authenticated users to upload arbitrary files and then run them subject to the privileges of<br />

the web server user.<br />

Solution: Upgrade to PHP Advanced Transfer Manager 1.22 or higher.<br />

CVE-2005-1681<br />

Mozilla Firefox < 1.0.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2887 FAMILY: Web Clients RISK: HIGH NESSUS ID:18243<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote host<br />

is using Firefox. This version of Firefox is prone to a remote exploit which stems from the<br />

'install()' method. Specifically, an attacker can pass JavaScript to the 'install()' method<br />

which would then be executed within the client browser. An attacker exploiting this flaw<br />

would only need to be able to entice a user into browsing to a malicious website. Successful<br />

exploitation would result in the client browser executing arbitrary code that could impact<br />

the confidentiality and integrity of the remote machine. The reported browser version (as<br />

seen on the network) is: \n %L<br />

Solution: Upgrade to version 1.0.4 or higher.<br />

CVE-2005-1532<br />

AOL Instant Messenger Font Tag sml Parameter Remote DoS<br />

<strong>PVS</strong> ID: 2888 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18299<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running AOL Instant Messenger (AIM). Versions 5.9.3702 and lower are<br />

reported to be vulnerable to a remote Denial of Service (DoS) attack. An attacker exploiting<br />

this flaw would only need to be able to initiate a chat, file transfer, or game request to a<br />

vulnerable instance of AOL IM. Successful exploitation would result in the Instant<br />

Messenger client crashing.<br />

Solution: When available, upgrade to a version of AOL IM greater than 5.9.3702.<br />

CVE-2005-1655<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Apple iTunes < 4.8 MPEG-4 File Handling Overflow<br />

<strong>PVS</strong> ID: 2889 FAMILY: Web Clients RISK: HIGH NESSUS ID:18214<br />

Family Internet Services 747

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!