27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

network usage.<br />

CVE Not available<br />

UBB.threads < 6.5.2 Beta 2 XSS / SQL Injection<br />

<strong>PVS</strong> ID: 3032 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running a version of UBB.threads that fails to correctly parse multiple PHP scripts. A<br />

remote attacker can send malformed HTTP requests that, when processed, forces the<br />

UBB.threads server to execute arbitrary database commands or inject malicious code into<br />

user browsers.\nAs a result, a remote attacker can pass malicious input to database queries,<br />

potentially resulting in data exposure, modification of the query logic, or even data<br />

modification or attacks against the database itself.<br />

Solution: Upgrade to version 6.5.2 Beta 2 or higher.<br />

CVE-2006-5136<br />

ClamAV < 0.86.1 Content-parsing DoS<br />

<strong>PVS</strong> ID: 3033 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ClamAV, an open-source antivirus solution for Unix-like<br />

systems.\nThis version of ClamAV is reported to be vulnerable to a flaw where the parsing<br />

of a malicious file will cause the ClamAV process to crash. An attacker exploiting this flaw<br />

would need to be able to send a specially formed email to the system running ClamAV.<br />

Successful exploitation would result in loss of service. The installed version of ClamAV is:<br />

\n %L<br />

Solution: Upgrade to version 0.86.1 or higher.<br />

CVE-2005-1923<br />

True North eMailServer < 5.3.4 Build 2019 LIST Command Remote DoS<br />

<strong>PVS</strong> ID: 3034 FAMILY: POP Server RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the True North eMailServer.\nThis version of eMailServer is<br />

vulnerable to a content-parsing flaw where a malformed IMAP request can cause the server<br />

to fail. An attacker exploiting this flaw would be able to disable the service remotely.<br />

Solution: Upgrade to version 5.3.4 Build 2019 or higher.<br />

POP Banner Detection<br />

CVE-2005-2083<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 774

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!