27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Serv-U FTP server. There is a bug in the way this version handles<br />

certain unspecified commands. While the details of the overflow are unknown, it is<br />

reported that successful exploitation leads to a Denial of Service (DoS) attack.<br />

Solution: Upgrade to version 6.1.0.4 or higher.<br />

Simple PHP Blog <<br />

CVE-2005-3467<br />

<strong>PVS</strong> ID: 3278 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Simple PHP Blog, a blog written in PHP. The version of Simple PHP Blog<br />

installed on the remote host is vulnerable to a SQL Injection flaw. An attacker exploiting<br />

this flaw would send malformed PHP queries to the application. Successful exploitation<br />

would result in the attacker executing arbitrary commands on the backend database.<br />

Solution: No solution is known at this time.<br />

CuteNews <<br />

CVE-2005-3473<br />

<strong>PVS</strong> ID: 3279 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: According to its version number, the remote host is running a version of CuteNews that<br />

allows an attacker to upload or download files outside of the web root directory. This can<br />

lead to an attack against both confidentiality and integrity. An attacker exploiting this flaw<br />

would simply send a malformed request including a '../' in the request. Successful<br />

exploitation leads to writing or reading arbitrary files outside of the web root.<br />

Solution: Upgrade to a version of CuteNews higher than 1.4.1.<br />

CVE-2005-3507<br />

Quicktime < 7.0.3 (Windows) Detection<br />

<strong>PVS</strong> ID: 3280 FAMILY: Web Clients RISK: HIGH NESSUS ID:20136<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote Windows<br />

host is running a version of Quicktime 7 that is older than Quicktime 7.0.3. This version is<br />

vulnerable to various buffer overflows that may allow an attacker to execute arbitrary code<br />

on the remote host by sending a malformed file to a victim and have him open it using<br />

QuickTime player.<br />

Solution: Upgrade to version 7.0.3 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 844

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!