27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-0563<br />

Opera Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3015 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18503<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is using a version of Opera that is prone to a security flaw where a malicious attacker<br />

can inject malicious data into a URI. Such an attack would require that the attacker be able<br />

to convince an Opera user to browse to a malicious URI. Successful exploitation would<br />

result in the attacker gaining access to confidential data (such as authentication cookies) or<br />

executing code within the browser.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2003-1420<br />

SquirrelMail < 1.4.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3016 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18504<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running SquirrelMail, a webmail system written in PHP.\nThe version of SquirrelMail<br />

installed on the remote host is prone to multiple flaws :\n - Multiple Cross-Site Scripting<br />

Vulnerabilities. Using a specially-crafted URL or email message, an attacker may be able<br />

to exploit these flaws, stealing cookie-based session identifiers and thereby hijacking<br />

SquirrelMail sessions.\n - Post Variable Handling Vulnerabilities - Using specially-crafted<br />

POST requests, an attacker may be able to set random variables in the file<br />

'options_identities.php', which could lead to accessing other users' preferences, cross-site<br />

scripting attacks, and writing to arbitrary files.\n<br />

Solution: Upgrade to version 1.4.5 or higher.<br />

CVE-2005-1769<br />

Ultimate PHP Board < 1.9.7 Multiple XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3017 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Ultimate PHP Board, a message board written \nin PHP.<br />

Versions of Ultimate less than 1.9.7 are vulnerable to\nmultiple Cross-Site Scripting (XSS)<br />

flaws. An attacker \nexploiting these flaws would typically need to be able to convince a<br />

user\nto browse to a malicious URI. Successful exploitation would result\nin arbitrary code<br />

executing in the client browser and possible theft of\nconfidential data (such as<br />

authentication cookies).<br />

Family Internet Services 769

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!