27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2005-2755<br />

ClamAV < 0.87.1 Content-parsing Buffer Overflow<br />

<strong>PVS</strong> ID: 3281 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running ClamAV, an open-source antivirus solution for Unix-like systems. This version of<br />

ClamAV is reported vulnerable to a flaw where the parsing of a malicious file will cause<br />

the clamav process to execute arbitrary code. An attacker exploiting this flaw would only<br />

need to be able to craft and send a malformed email to a ClamAV server. Successful<br />

exploitation results in the server executing arbitrary code or crashing.<br />

Solution: Upgrade to version 0.87.1 or higher.<br />

CVE-2005-3501<br />

Acme thttpd < 2.24 CGI Test Script Symlink Arbitrary File Overwrite<br />

<strong>PVS</strong> ID: 3282 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a local flaw in the way that it creates<br />

temporary files.\n\nThe remote host is running a vulnerable version of Acme thttpd. It is<br />

reported that versions prior to 2.24 are prone to a local flaw where temporary files can be<br />

used by local users to escalate their privileges on the machine. Specifically, attackers can<br />

use the insecure temp files to overwrite critical web content or configuration files.<br />

Solution: Upgrade to version 2.24 or higher.<br />

CVE-2005-3124<br />

PHPList < 2.10.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3283 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHPList. PHPList is a PHP application that gathers handles mailing and<br />

customer lists. This version is reported to be prone to a SQL Injection flaw. An attacker<br />

exploiting this flaw would be able to read the database, manipulate the database, and<br />

possibly run commands with the privileges of the web server. The SQL injection attack<br />

vector requires administrative access. There is also a directory traversal flaw where an<br />

attacker can send a malformed HTTP query and retrieve files outside of the webroot<br />

directories. Finally, the remote application is vulnerable to multiple HTML injection and<br />

Cross-Site Scripting (XSS) flaws.<br />

Solution: Upgrade to version 2.10.3 or higher.<br />

CVE-2005-3557<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 845

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!