27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: No solution is known at this time.<br />

CVE-2005-3299<br />

WebGUI < 6.7.6 Unspecified Code Execution<br />

<strong>PVS</strong> ID: 3253 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'code execution'<br />

vulnerability.\n\nThe remote host is running WebGUI, a content management framework.<br />

The remote version of this software is vulnerable to an undisclosed remote vulnerability<br />

that would allow an attacker to execute arbitrary code with the permissions of the<br />

webserver.<br />

Solution: Upgrade to version 6.7.6 or higher.<br />

CVE-2005-4694<br />

ClamAV < 0.87.2 Content-parsing DoS<br />

<strong>PVS</strong> ID: 3254 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running ClamAV, an open-source antivirus solution for Unix-like systems.<br />

This version of ClamAV is reported vulnerable to a flaw where the parsing of a malicious<br />

file will cause the clamav process to enter an infinite loop. Successful exploitation causes<br />

the clamd service to exit.<br />

Solution: Upgrade to version 0.87.2 or higher.<br />

CVE-2005-3239<br />

GNU WGet < 1.10.2 Buffer Overflow<br />

<strong>PVS</strong> ID: 3255 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using a version of wget that contains a flaw in the way that it handles NTLM authentication<br />

data. Specifically, a rogue website that returns malformed data during an NTLM<br />

authentication session will be able to execute arbitrary code on the local client machine.<br />

Solution: Upgrade to version 1.10.2 or higher.<br />

CVE-2006-1985<br />

Curl NTLM Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3256 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 837

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!