27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: The remote host is running the Opera Mail Client. This version of Opera is reported to be<br />

vulnerable to multiple remote attack vectors. An attacker exploiting this flaw would need to<br />

be able to convince an Opera mail user to open a malicious email or attachment. Successful<br />

exploitation would result in arbitrary code being executed.<br />

Solution: Upgrade to version 8.50 or higher.<br />

CVE-2005-3041<br />

Opera < 8.50 Upload Flaw<br />

<strong>PVS</strong> ID: 3233 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a 'file upload' flaw.\n\nThe remote host is<br />

using a version of Opera that is vulnerable to an unspecified file upload vulnerability. An<br />

attacker exploiting this flaw would need to be able to convince a user to browse to a<br />

malicious URI. Successful exploitation would result in the attacker executing arbitrary code<br />

on the target machine.<br />

Solution: Upgrade to version 8.50 or higher.<br />

CVE-2005-3041<br />

PHP Advanced Transfer Manager <<br />

<strong>PVS</strong> ID: 3234 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19768<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

PHP Advanced Transfer Manager on the remote host suffers from multiple information<br />

disclosure and cross-site scripting flaws. For example, by calling the text or HTML viewer<br />

directly, an unauthenticated attacker can view arbitrary files, possibly even from remote<br />

hosts, provided PHP's 'register_globals' setting is enabled. As another example, an attacker<br />

can issue a request for '/PATH/users/username' and retrieve sensitive user credentials. In<br />

addition, selected PHP settings on the remote host can be disclosed by accessing the<br />

'test.php' script directly.<br />

Solution: Disable PHP's 'register_globals' setting and remove the 'test.php' script.<br />

CVE Not available<br />

PunBB < 1.2.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3235 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:19775<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

PunBB installed on the remote host suffers from several flaws.\n\nA File Inclusion<br />

Vulnerability - The application fails to validate the 'language' parameter when a user<br />

updates their profile and uses that throughout the application to require PHP code in order<br />

to display messages. An attacker with an account on the affected application may be able to<br />

Family Internet Services 831

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!