27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2005-3251<br />

PunBB < 1.2.9 search.php old_searches Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3260 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20013<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe version of<br />

PunBB installed on the remote host fails to sanitize user-supplied input to the 'old_searches'<br />

parameter of the 'search.php' script before using it in database queries. Provided PHP's<br />

'register_globals' setting is enabled, an attacker may be able to exploit this issue to delete<br />

arbitrary data or launch attacks against the underlying database.<br />

Solution: Upgrade to version 1.2.9 or higher.<br />

CVE-2005-3518<br />

Lynx < 2.8.6 dev14 NNTP Headers Buffer Overflow<br />

<strong>PVS</strong> ID: 3261 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Lynx as a web browser. This version of Lynx is vulnerable to a buffer overflow when<br />

processing malformed NNTP headers. An attacker exploiting this flaw would need to be<br />

able to convince the local Lynx user to browse a malicious NNTP server. Successful<br />

exploitation will result in the attacker running arbitrary code on the local system.<br />

Solution: Upgrade to version 2.8.6 dev14 or higher.<br />

CVE-2005-3120<br />

PHP < 5.0.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3262 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP that is older than 5.0.5. This version has a number of bugs that<br />

allow attackers to execute or retrieve arbitrary files outside of the web root directory. An<br />

attacker exploiting these flaws would only need to send a malformed HTTP request to the<br />

vulnerable system. Successful exploitation would result in the loss of confidential data or a<br />

breach of system integrity.<br />

Solution: Upgrade to version 5.0.5 or higher.<br />

CVE Not available<br />

Xerver < 4.20 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3263 FAMILY: Web Servers NESSUS ID:20062<br />

Family Internet Services 839

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!