27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix-like systems. This version of<br />

ClamAV is reported to be vulnerable to a flaw where the parsing of a malicious file will<br />

cause the clamav process to overflow system memory, possibly resulting in an attacker<br />

executing code. An attacker exploiting this flaw would need to be able to send a specially<br />

formed email to the system running ClamAV. In addition, this version of ClamAV is<br />

vulnerable to a remote Denial of Service (DoS) attack that would render the service<br />

unavailable to valid users.<br />

Solution: Upgrade to version 0.86.3 or higher.<br />

CVE-2005-2920<br />

CuteNews flood.db.php HTTP Header PHP Code Injection<br />

<strong>PVS</strong> ID: 3230 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection<br />

attack.\n\nAccording to its version number, the remote host is running a version<br />

of CuteNews that allows an attacker to inject arbitrary script code. An attacker<br />

exploiting this flaw would be able to inject script code that would either be<br />

executed locally or possibly executed within the browser of an unsuspecting<br />

user.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3010<br />

vBulletin < 3.0.10 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3231 FAMILY: CGI RISK: HIGH NESSUS ID:19760<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

vBulletin installed on the remote host fails to properly sanitize user-supplied input to a<br />

number of parameters and scripts before using it in database queries and to generate<br />

dynamic HTML. An attacker can exploit these issues to launch SQL injection and<br />

cross-site scripting attacks against the affected application. Note that the affected scripts<br />

require moderator or administrator acess, with the exception of 'joinrequests.php'.<br />

Solution: Upgrade to version 3.0.10 or higher.<br />

CVE-2005-3025<br />

Opera < 8.50 Mail Client Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3232 FAMILY: SMTP Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 830

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!