27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3035 FAMILY: POP Server RISK: NONE NESSUS ID:Not Available<br />

Description: A POP server is running on this port. Its banner is :\n %L<br />

Solution: N/A<br />

CVE Not available<br />

True North eMailServer < 5.3.4 Build 2019 LIST Command Remote DoS<br />

<strong>PVS</strong> ID: 3036 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18570<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the True North eMailServer.\nThis version of eMailServer is<br />

vulnerable to a content-parsing flaw where a malformed IMAP request can cause the server<br />

to fail. An attacker exploiting this flaw would be able to disable the service remotely.<br />

Solution: Upgrade to version 5.3.4 Build 2019 or higher.<br />

CVE-2005-2083<br />

PHP-Fusion < 6.00.106 submit.php Multiple Parameter HTML Injection<br />

<strong>PVS</strong> ID: 3037 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an HTML Injection attack.\n\nThe remote<br />

host is running a version of PHP-Fusion that is vulnerable to an HTML injection flaw.<br />

Specifically, the submit.php script fails to properly sanitize input data via the 'news_body',<br />

'article_description', and 'user_pass' parameters. An attacker exploiting this flaw would<br />

typically need to be able to convince a remote user to browse to a malicious URI. A<br />

successful attack would yield potentially confidential data (cookies, credentials) as well as<br />

potentially execute malicious code within the context of the vulnerable server.<br />

Solution: Upgrade to version 6.00.106 or higher.<br />

CVE-2005-2074<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpBB < 2.0.16 viewtopic.php Arbitrary Code Execution<br />

<strong>PVS</strong> ID: 3038 FAMILY: CGI RISK: HIGH NESSUS ID:18589<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running phpBB, a web-based forum application written in PHP. There is a flaw in this<br />

version of phpBB that will allow remote attackers to inject arbitrary code into the<br />

'viewtopic.php' script. An attacker exploiting this flaw would only need to be able to send<br />

an HTTP request to the vulnerable script. Successful execution would result in the attacker<br />

executing code with the permissions of the webserver.<br />

Family Internet Services 775

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!