27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3270 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20097<br />

Description: Synopsis :\n\nThe remote web server is prone to denial of service attacks.\n\nThe remote<br />

host appears to be running the WindWeb web server, which is found on embedded devices<br />

running Wind River Systems' VxWorks such as certain ADSL modems and routers. The<br />

version of WindWeb installed on the remote host is affected by a remote denial of service<br />

vulnerability when it receives maliciously crafted requests. An attacker may be able to<br />

leverage this issue to deny access to the web server to legitimate users.<br />

Solution: No solution is known at this time.<br />

CVE-2005-3475<br />

Snitz Forum < 3.4.0.06 XSS<br />

<strong>PVS</strong> ID: 3271 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote host appears to be running Snitz Forum, a web forum application implemented in<br />

ASP. It is reported that versions of Snitz Forum prior to 3.4.0.06 are prone to a Cross-Site<br />

Scripting (XSS) attack.<br />

Solution: Upgrade to version 3.4.0.06 or higher.<br />

CVE-2007-1374<br />

NTOP < 3.2 ntop.init Temporary File Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3272 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running NTOP, a tool for viewing network<br />

configuration, usage, statistics, protocols and much more via a web interface. This version<br />

of NTOP is reported ot be prone to a local exploit. Specifically, a local attacker can<br />

overwrite critical ntop temporary files, leading to an escalation of privileges.<br />

Solution: Upgrade to version 3.2 or higher.<br />

CVE-2005-3387<br />

PHP < 5.0.6 GLOBAL Variable Overwrite<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3273 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running a version of PHP that is older than 5.0.6. This<br />

version has a flaw where remote attackers can reenable the 'register_globals' parameter. In<br />

addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead<br />

to another more serious exploitation. The remote host is running PHP version: \n %L<br />

Family Internet Services 842

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!