27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote web server could potentially allow remote attackers to<br />

manipulate the password database.\n\nThe remote host appears to be running a version of<br />

Apache, an open source web server. This version of Apache is vulnerable to a flaw in the<br />

'htpasswd' utility. This issue is not considered a local flaw, as the program is not run setuid.<br />

An attacker exploiting this flaw would need to find a vulnerable Apache Web server that<br />

was making a call to 'htpasswd' via a CGI script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Hummingbird Inetd Multiple Remote Overflows<br />

<strong>PVS</strong> ID: 2941 FAMILY: FTP Servers RISK: HIGH NESSUS ID:18403<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Hummingbird Inetd, a commercial INETD server. This version of Inetd is<br />

vulnerable to a remote overflow in the lpd service module. An attacker exploiting this flaw<br />

would be able to execute arbitrary code on the remote system. NOTE: this is only a flaw if<br />

the lpd module is enabled. In addition, the remote ftpd module is vulnerable to a remote<br />

buffer overflow. An attacker exploiting this flaw would be able to execute arbitrary code on<br />

the remote system.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2599<br />

Invision Board < 2.0.5 Privilege Escalation / SQL Injection<br />

<strong>PVS</strong> ID: 2942 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18401<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Invision Board, a CGI suite designed to set up a<br />

bulletin board system on the remote web server.\nThis version of Invision Board is<br />

vulnerable to a flaw in the way that it handles moving of users from one group to another<br />

group. It is reported that non-admin users can, when deleting a user account, optionally<br />

move the user into an administrative group.\nThis can allow users to elevate their rights to<br />

that of an administrator.\n\nIn addition to this, the remote version of this software is<br />

vulnerable to a SQL injection vulnerability that may allow an attacker to execute arbitrary<br />

SQL statements against the remote host.<br />

Solution: Upgrade to version 2.0.5 or higher.<br />

CVE-2006-0888<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PeerCast < 0.1212 URL Error Message Format String<br />

<strong>PVS</strong> ID: 2943 FAMILY: Web Servers RISK: HIGH NESSUS ID:18417<br />

Family Internet Services 763

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!