27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is using Lynx as a web browser. This version of Lynx is<br />

vulnerable to a flaw where an attacker, convincing a Lynx user to browse a malicious URI,<br />

can execute arbitrary code on the remote system.<br />

Solution: Upgrade to version 2.8.6 dev15 or higher.<br />

CVE-2005-2929<br />

IPCop Web Interface Detection<br />

<strong>PVS</strong> ID: 3288 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the IPCop web interface. This<br />

interface allows administrators to remotely access and configure the underlying firewall.<br />

Because compromise of a firewall can lead to much more serious attacks, care should be<br />

taken to harden the IPCop web interface. Critical information (such as firewall<br />

configuration, administrative login, etc.) should not be passed across the network<br />

unencrypted.<br />

Solution: Ensure that only valid users can query the IPCop interface. Require the use of SSL from<br />

remote users.<br />

CVE Not available<br />

PHPSysInfo < 2.4.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3289 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHPSysInfo, a PHP application that gives system information via a web<br />

interface. This version of PHPSysInfo is vulnerable to a multitude of flaws. These flaws<br />

include Cross-Site Scripting (XSS), HTML injection, and a local file inclusion flaw. There<br />

is also an inherent risk whenever system information is displayed via a web interface. Of<br />

these flaws, the more serious flaw is the local file inclusion vulnerability. An attacker<br />

exploiting this flaw would be able to retrieve and display potentially confidential files (such<br />

as /etc/passwd). This can lead to confidential materials being downloaded by anonymous<br />

users.<br />

Solution: Upgrade to version 2.4.0 or higher.<br />

CVE-2005-3347<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

phpWebThings download.php file Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3290 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 847

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!