27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RISK:<br />

MEDIUM<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote JBoss server is vulnerable to an information disclosure flaw that<br />

may allow an attacker to retrieve the physical path of the server installation, its security<br />

policy, or to guess its exact version number.\nAn attacker may use this flaw to gain more<br />

information about the remote configuration.<br />

Solution: Upgrade to JBoss 3.2.8, 4.0.3 or higher.<br />

ZenWorks Detection<br />

CVE-2005-2006<br />

<strong>PVS</strong> ID: 3022 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running ZenWorks, a remote management interface from Novell.<br />

Solution: N/A<br />

CVE Not available<br />

Cisco VPN Concentrator Group Name Enumeration<br />

<strong>PVS</strong> ID: 3023 FAMILY: SNMP Traps<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote VPN concentrator is subject to an information disclosure flaw.\nAn<br />

attacker connecting in Agressive mode can determine whether a remote Cisco group is<br />

defined. This can allow the attacker the ability to garner information useful in future brute<br />

force attacks.<br />

Solution: http://www.cisco.com/univercd/cc/td/doc/product/vpn/vpn3000/4_7/471con3k.htm<br />

CVE-2005-2025<br />

MercuryBoard User-Agent HTTP Header SQL Injection<br />

<strong>PVS</strong> ID: 3024 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18541<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running MercuryBoard, a web-based message board written in PHP. This version of<br />

MercuryBoard is vulnerable to a remote SQL Injection flaw.\nAn attacker exploiting this<br />

flaw would send a malformed HTTP query to the application. Successful exploitation<br />

would result in the attacker being able to read or write confidential data. In addition, the<br />

attacker may be able to execute arbitrary code on the remote database server.<br />

Family Internet Services 771

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!