27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>PVS</strong> ID: 3160 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host<br />

seems to be running Gaim, a popular open-source, multi-protocol instant messenger. It is<br />

reported that this version of Gaim is vulnerable to several remote flaws. An attacker<br />

exploiting these flaws would be able to create a Denial of Service (DoS) condition or<br />

possibly overflow system memory and execute arbitrary code.<br />

Solution: Update to version 1.3.2 or higher.<br />

CVE-2005-2102<br />

Ximian Evolution < 2.3.7 Content-Parsing Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3161 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the Ximian Evolution email client that does not properly parse<br />

user-supplied data. A remote attacker can craft an email message such that, upon opening,<br />

Evolution crashes or executes arbitrary code.<br />

Solution: Upgrade to version 2.3.7 or higher.<br />

CVE-2005-2549<br />

WordPress < 1.5.1.4 cache_lastpostdate Parameter PHP Code Injection<br />

<strong>PVS</strong> ID: 3162 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19414<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe installed<br />

version of WordPress on the remote host will accept and execute arbitrary PHP code passed<br />

to the 'cache_lastpostdate' parameter via cookies provided PHP's 'register_globals' setting is<br />

enabled.<br />

Solution: Upgrade to version 1.5.1.4 or disable PHP's 'register_globals' setting.<br />

CVE-2005-2612<br />

phpBB < 2.0.20 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3163 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack<br />

vectors.\n\nAccording to its banner, the remote host is running a version of<br />

phpBB that fails to sanitize BBCode '[IMG]' tags. This can enable an attacker to<br />

cause arbitrary HTML and script code to be executed in a user's browser within<br />

the context of the affected site. There is also a flaw in the way that phpBB<br />

deregisters its global variables. An attacker exploiting this flaw would be able to<br />

inject and execute PHP code, execute SQL Injection attacks, and more.<br />

Family Internet Services 811

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!