27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Golden FTP Server, an FTP server for the Windows platform. This version<br />

of Golden FTP is vulnerable to a number of different flaws. An attacker exploiting these<br />

flaws would be able to either execute arbitrary code or cause the application to fail.<br />

Solution: Upgrade to version 2.7.0 or higher.<br />

CVE-2005-4553<br />

osTicket < 1.3.1 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3046 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:18612<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

osTicket installed on the remote host suffers from several vulnerabilities, including:\n\n- A<br />

Local File Include Vulnerability\nThe application fails to sanitize user-supplied input to the<br />

'inc' parameter in the 'view.php' script. After authentication, an attacker can exploit this<br />

flaw to run arbitrary PHP code found in files on the remote host provided PHP's<br />

'register_globals' setting is enabled.\n\n- A SQL Injection Vulnerability\nAn authenticated<br />

attacker can affect SQL queries via POST queries due to a failure of the application to filter<br />

input to the 'ticket' variable in the 'class.ticket.php' code library.<br />

Solution: Upgrade to version 1.3.1 or higher.<br />

CVE-2005-1439<br />

PHPNews < 1.2.6 news.php prevnext Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3047 FAMILY: CGI RISK: HIGH NESSUS ID:18621<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running PHPNews, an open-source news application written in PHP. The installed<br />

version of PHPNews is prone to a SQL injection attack due to its failure to sanitize<br />

user-supplied input via the 'prevnext' parameter of the 'news.php' script. An attacker can<br />

exploit this flaw to affect database queries, possibly revealing sensitive information,<br />

launching attacks against the underlying database, and more.<br />

Solution: Upgrade to version 1.2.6 or higher.<br />

CVE-2005-2156<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Courier Mail Server < 0.50.1 SPF Data Lookup Remote DoS<br />

<strong>PVS</strong> ID: 3048 FAMILY: SMTP Servers RISK: LOW NESSUS ID:18620<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Courier Mail Server, an open source mail server for Linux and Unix.<br />

The installed version of Courier is prone to a remote denial of service vulnerability<br />

associated with Sender Policy Framework (SPF) data lookups. To exploit this flaw, an<br />

attacker would need to control a DNS server and return malicious SPF records in response<br />

Family Internet Services 778

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!