27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BNBT P2P Tracking Detection<br />

<strong>PVS</strong> ID: 3196 FAMILY: Web Servers RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running the BNBT web application. BNBT is a tool for tracking<br />

peer-to-peer (P2P) BitTorrent connections.<br />

Solution: Ensure that P2P applications are allowed by corporate policies and procedures.<br />

CVE Not available<br />

BNBT EasyTracker Malformed Request DoS<br />

<strong>PVS</strong> ID: 3197 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19548<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running BNBT EasyTracker, a packaged BitTorrent tracker installer for<br />

Windows. The remote version of BNBT EasyTracker fails to properly handle malformed<br />

HTTP requests, making it prone to denial of service attacks. An attacker can crash the<br />

application by sending a request with a header line consisting of only a ':'.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2806<br />

Simple Machines Forum < 1.0.7 Code Injection<br />

<strong>PVS</strong> ID: 3198 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running the Simple Machines Forum (SMF), a web forum. This version of SMF is<br />

vulnerable to a remote code injection flaw. An attacker exploiting this flaw would be able<br />

to execute arbitrary PHP code on the target web server. In addition, the remote host is<br />

vulnerable to an HTML injection attack. An attacker exploiting this flaw would create a<br />

post that included malicious script code. The attacker would then wait for a vulnerable user<br />

to peruse the page. Successful exploitation would result in malicious code executing within<br />

the user browser.<br />

Solution: Upgrade to version 1.0.7 or higher.<br />

CVE-2006-0896<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

IndiaTimes Instant Messenger ActiveX RenameGroup Function Overflow<br />

<strong>PVS</strong> ID: 3199 FAMILY: Internet Messengers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running IndiaTimes Instant Messaging client. IndiaTimes allows users to consolidate ICQ,<br />

Yahoo, AIM and MSN messengers into a single GUI console. This version of IndiaTimes<br />

Family Internet Services 821

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!