27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2005-2432<br />

Opera Multiple Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3153 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is using a version of Opera that is vulnerable to a download dialog spoofing<br />

flaw. Specifically, a malicious web site operator can create downloadable files that, upon<br />

download, appear to be innocent. For example, the user may think that they are<br />

downloading and opening a text file when in fact they are running an executable.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2406<br />

MetaSploit < 2.4-current Unspecified Vulnerability<br />

<strong>PVS</strong> ID: 3154 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to unspecified remote attack vectors.\n\nThe<br />

remote server is running a MetaSploit Framework server. Metasploit allows users to<br />

automatically exploit and backdoor vulnerable applications via the network. This version of<br />

MetaSploit is reported vulnerable to an unspecified issue.<br />

Solution: Upgrade to version 2.4-current or higher.<br />

CVE-2005-2482<br />

BusinessMail SMTP < 4.7 Multiple Command Remote Overflows<br />

<strong>PVS</strong> ID: 3155 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple buffer overflows.\n\nThe remote<br />

host is running a version of BusinessMail that fails to sanitize user-supplied SMTP input.<br />

An attacker exploiting this flaw would be able to potentially execute malicious code on the<br />

remote server.<br />

Solution: Upgrade to version 4.7 or higher.<br />

CVE-2005-2472<br />

<strong>Network</strong>Activ < 3.5.14 Multiple Parameter XSS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3156 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running <strong>Network</strong>Activ, a web server. This version of <strong>Network</strong>Activ is<br />

vulnerable to a remote Cross-Site Scripting (XSS) attack. An attacker exploiting this flaw<br />

would typically need to convince a user to browse to a malicious URI. Success exploitation<br />

would result in the theft of confidential materials (such as authentication cookies).<br />

Family Internet Services 809

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!