27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Phorum < 5.0.18 register.php XSS<br />

<strong>PVS</strong> ID: 3203 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19584<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a cross-site scripting (XSS) attack.\n\nThe<br />

remote version of Phorum contains a script called 'register.php' that is vulnerable to a<br />

cross-site scripting attack. An attacker may exploit this problem to steal the authentication<br />

credentials of third party users.<br />

Solution: Upgrade to version 5.0.18 or higher.<br />

CVE-2005-2836<br />

PBLang Bulletin Board < 4.66z Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3204 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running PBLang, a bulletin board system written in PHP. This version of PBLang is<br />

reported to be vulnerable to a number of remote overflows. While the details of the<br />

vulnerabilities are unknown at this time, it is alleged that a remote attacker would be able to<br />

execute commands with 'Administrative' privileges.<br />

Solution: Upgrade to version 4.66z or higher.<br />

CVE Not available<br />

OpenSSH < 4.2p1 GSSAPI Authentication Credential Escalation<br />

<strong>PVS</strong> ID: 3205 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running a version of OpenSSH which is<br />

vulnerable to a flaw in the way that it handles GSSAPI authentication. Specifically, if<br />

GSSAPI is enabled and 'GSSAPIDelegateCredentials' is enabled, an attacker may gain<br />

access to GSSAPI credentials.<br />

Solution: Upgrade to version 4.2p1 or higher.<br />

CVE-2005-2798<br />

Squid sslConnectTimeout Function Remote DoS<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3206 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Squid caching proxy, according to its version number, is vulnerable to an attack<br />

where the attacker can cause the Squid proxy to stop servicing valid service requests. The<br />

flaw is within the 'sslConnectTimeout' function and stems from the functions inability to<br />

Family Internet Services 823

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!