27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix-like systems. This version of<br />

ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious file will<br />

cause the clamav process to overflow system memory, possibly resulting in an attacker<br />

executing code. An attacker exploiting this flaw would need to be able to send a specially<br />

formed email to the system running ClamAV.<br />

Solution: Upgrade to version 0.86.2 or higher.<br />

CVE-2005-2450<br />

Hobbit Monitor < 4.1.0 Remote DoS<br />

<strong>PVS</strong> ID: 3109 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Hobbit Monitor, a web-based host/network monitoring software.<br />

This version of Hobbit Monitor is prone to a remote denial of service attack. An attacker<br />

sending a specially formatted string to the hobbitd process can force the software to crash.<br />

Solution: Upgrade to version 4.1.0 or higher.<br />

CVE Not available<br />

FtpLocate Multiple Scripts fsite Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3110 FAMILY: CGI RISK: HIGH NESSUS ID:19300<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands\n\nThe remote host is running FtpLocate, a web search engine for FTP<br />

sites written in Perl.\n\nThe installed version of FtpLocate allows remote attackers to<br />

execute commands on the remote host by manipulating input to the 'fsite' parameter in<br />

various scripts.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2420<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Atomic Photo Album apa_phpinclude.inc.php apa_module_basedir Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3111 FAMILY: CGI RISK: HIGH NESSUS ID:19299<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Atomic Photo Album, a free PHP-based photo gallery. The installed version of<br />

Atomic Photo Album allows remote attackers to control the 'apa_module_basedir' variable<br />

used when including PHP code in the 'apa_phpinclude.inc.php' script. By leveraging this<br />

flaw, an attacker may be able to view arbitrary files on the remote host and execute<br />

arbitrary PHP code, possibly taken from third-party hosts.<br />

Family Internet Services 793

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!