27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

cookies).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

ColdFusion Error Page XSS<br />

<strong>PVS</strong> ID: 2893 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Macromedia ColdFusion, a web application server. This version<br />

of ColdFusion is vulnerable to a Cross-Site Scripting (XSS) flaw in the way that it handles<br />

displaying error pages. An attacker exploiting this flaw would need to be able to convince a<br />

user to browse to a malicious URI. Further, the Macromedia site would need to be utilizing<br />

the JRUN web server (installed by default, but not recommended for production services).<br />

Successful exploitation would result in the potential loss of confidential data (such as<br />

authentication cookies).<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Gaim < 1.3.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2894 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be running Gaim, a popular open-source, multi-protocol instant messenger. It is<br />

reported that this version of Gaim is vulnerable to several remote flaws. Namely\n\n1) The<br />

MSN protocol module is vulnerable to a remote Denial of Service (DoS) attack when sent a<br />

NULL SLP message. Successful exploitation results in the application crashing.\n\n2)<br />

Gaim instant messages support the sending of links (URIs). This version of Gaim only<br />

supports links of 8192 bytes or less. An attacker sending a link of more than 8192 bytes can<br />

overwrite memory and execute arbitrary code.<br />

Solution: Update to Gaim 1.3.0 or higher.<br />

CVE-2005-1261<br />

Bakbone NetVault < 7.1.1 Unspecified Remote Overflow<br />

<strong>PVS</strong> ID: 2895 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Bakbone NetVault, an enterprise backup/restore application. This version of<br />

NetVault is reported to be vulnerable to a remote heap overflow. The details of the flaw are<br />

not currently known. It is believed that a successful attack would lead to arbitrary code<br />

being executed.<br />

Solution: Upgrade to version 7.1.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 749

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!