27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-2692<br />

CVS < 1.12.13 Local 'tmp' File Permission Vulnerability<br />

<strong>PVS</strong> ID: 3181 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running a CVS server that, according to its version<br />

number, is vulnerable to a flaw in the way that it creates and protects temporary files. A<br />

local user exploiting this flaw may be able to write arbitrary information into critical CVS<br />

files.<br />

Solution: Upgrade to version 1.12.13 or higher.<br />

CVE Not available<br />

WebCalendar < 1.0.1 send_reminders.php includedir Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3182 FAMILY: CGI RISK: HIGH NESSUS ID:19502<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a script injection attack.\n\nThe remote<br />

version of WebCalendar fails to sanitize user-supplied input to the 'includedir' parameter of<br />

the 'send_reminders.php' script. By leveraging this flaw, an attacker may be able to view<br />

arbitrary files on the remote host and execute arbitrary PHP code, possibly taken from<br />

third-party hosts.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

CVE-2005-2717<br />

MPlayer < 1.0pre8 Audio Header strf Overflow<br />

<strong>PVS</strong> ID: 3183 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of MPlayer, a multimedia video and audio application. This version of<br />

MPlayer is vulnerable to a buffer overflow due to a lack of content parsing. An attacker<br />

exploiting this flaw would need to craft a malicious media file and then convince a local<br />

user to download and play the file within MPlayer. Successful exploitation would result in<br />

arbitrary code being executed locally.<br />

Solution: Upgrade to version 1.0pre8 or higher.<br />

CVE-2005-2718<br />

Simple PHP Blog (SPHPBlog) <<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3184 FAMILY: CGI RISK: HIGH NESSUS ID:19516<br />

Family Internet Services 817

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!