27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IRC Client Detection<br />

CVE-2005-2401<br />

<strong>PVS</strong> ID: 3101 FAMILY: IRC Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running an IRC client. The IRC command that triggered this plugin was:<br />

\n %L<br />

Solution: N/A<br />

CVE Not available<br />

SlimFTPd < 3.17 Multiple Commands Remote Overflow<br />

<strong>PVS</strong> ID: 3102 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running a vulnerable version of SlimFTPd, a small FTP server for Windows. It<br />

is reported that versions up to 3.16 are prone to buffer overflow vulnerability that may<br />

allow an attacker to execute arbitrary code on this host. A attacker needs a valid FTP<br />

account to exploit this vulnerability (to include anonymous access, if enabled).\n\nNOTE:<br />

The SlimFTPd hotfix does not change the version number from 3.16 to 3.17. The version<br />

number is: \n %L<br />

Solution: Upgrade to version 3.17 or higher.<br />

CVE-2004-2418<br />

CMSimple < 2.5 Beta 3 Search Function XSS<br />

<strong>PVS</strong> ID: 3103 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a version of CMSimple, a content management system. This<br />

version of CMSimple is vulnerable to a remote Cross-Site Scripting (XSS) attack. An<br />

attacker exploiting this flaw would typically need to be able to convince a user to browse to<br />

a malicious URI. Successful exploitation would result in arbitrary code executing in the<br />

client browser and possible theft of confidential data (such as authentication cookies).<br />

Solution: Upgrade to version 2.5 Beta 3 or higher.<br />

CVE-2005-2392<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

PHPNews < 1.3.0 auth.php Multiple Field SQL Injection<br />

<strong>PVS</strong> ID: 3104 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running PHPNews, an open-source news application written<br />

in PHP. The installed version of PHPNews is prone to a SQL injection attack due to its<br />

failure to sanitize user-supplied input. An attacker can exploit this flaw to affect database<br />

Family Internet Services 791

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!