27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

is vulnerable to a remote buffer overflow. An attacker exploiting this flaw would need to be<br />

able to convince a user to browse to a malicious website and execute a malicious ActiveX<br />

control. Successful exploitation would lead to the attacker executing arbitrary code on the<br />

remote system.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2844<br />

Barracuda Spam Firewall < Firmware 3.1.18 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3200 FAMILY: Web Servers RISK: HIGH NESSUS ID:19556<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

appears to be a Barracuda Spam Firewall appliance, which protects mail servers from spam<br />

and viruses. It appears that the installed appliance suffers from several vulnerabilities that<br />

allow for execution of arbitrary code and reading of arbitrary files, all subject to the<br />

permissions of the web server user ID.<br />

Solution: Upgrade to firmware 3.1.18 or higher.<br />

CVE-2005-2847<br />

SlimFTPd Multiple Command Remote Overflow DoS<br />

<strong>PVS</strong> ID: 3201 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19588<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host appears to be using SlimFTPd, a free, small standards-compliant FTP server<br />

for Windows. The installed version of SlimFTPd on the remote host suffers from a denial<br />

of service vulnerability. By sending 'user' and 'pass' commands that are each 40 bytes long,<br />

an attacker will crash the service after a short period of time.<br />

Solution: No solution is known at this time.<br />

CVE-2005-2850<br />

PHPGroupWare < 0.9.16.007 Main Screen Message Script Injection<br />

<strong>PVS</strong> ID: 3202 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

seems to be running PHPGroupWare, a groupware system implemented in PHP. This<br />

version is reported vulnerable to a flaw where the Administrator can inject script code into<br />

the browsers of unsuspecting users.<br />

Solution: Upgrade to version 0.9.16.007 or higher.<br />

CVE-2005-2761<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 822

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!