27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the SunOne Web Proxy. Alledgedly, successful exploitation of an<br />

overflow would result in a Denial of Service (DoS), thereby rendering the service<br />

unuseable to valid users.<br />

Solution: Upgrade to 3.6 SP8 or higher.<br />

CVE-2005-4806<br />

Sawmill < 7.1.14 GET Request Query String XSS<br />

<strong>PVS</strong> ID: 3219 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19681<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host is running Sawmill, a weblog analysis package. The version of Sawmill<br />

installed on the remote host suffers from a cross-site scripting flaw because its standalone<br />

web server treats an arbitrary query string appended to a GET request as a configuration<br />

command and fails to sanitize it before using it in an error page. An unauthenticated<br />

attacker may be able to exploit this issue to steal authentication information of users of the<br />

affected application.<br />

Solution: Upgrade to version 7.1.14 or higher or use Sawmill in CGI mode.<br />

CVE-2005-2950<br />

punBB < 1.2.7 Multiple SQL Injection Vulnerabilities<br />

<strong>PVS</strong> ID: 3220 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running punBB, a web-based bulletin board. This version of<br />

punBB ( %L ) is vulnerable to a SQL Injection attack. Due to a content-parsing flaw,<br />

attackers can inject SQL commands into a PHP script. An attacker exploiting this flaw<br />

would only need to be able to send HTTP requests to the application. Successful<br />

exploitation would result in the attacker having the ability to read or write to the database.<br />

In addition, the attacker may be able to execute arbitrary commands on the remote system.<br />

Solution: Upgrade to version 1.2.7 or higher.<br />

CVE-2005-4665<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Linksys Wireless Router < 4.20.7 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3221 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a Linksys wireless router. This version of the router is vulnerable to multiple<br />

remote flaws. An attacker exploiting these flaws would need to be on the internal network<br />

and have the ability to craft HTTP requests to the default Linksys web server. Successful<br />

Family Internet Services 827

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!