27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

of unsuspecting users.<br />

Solution: Upgrade to version 2.2.4 or higher.<br />

CVE-2005-3681<br />

Absinthe SQL Injection Tool Detection<br />

<strong>PVS</strong> ID: 3294 FAMILY: Web Clients RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running Absinthe. Absinthe is a tool that automates SQL Injection<br />

queries and makes a local copy of the remote database. Given a form or script that is<br />

vulnerable to SQL Injection, Absinthe will take care of all the brute-forcing necessary to<br />

build a local copy of the database. The script that Absinthe appears to be targeting is\n\n%L<br />

Solution: Ensure that this application is being used in conjunction with corporate policies and<br />

guidelines.<br />

CVE Not available<br />

Macromedia Flash < 2.0 Malformed RTMP Data DoS<br />

<strong>PVS</strong> ID: 3295 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Macromedia Flash server, a multimedia server. This version of Flash<br />

is reported to be vulnerable to a flaw; however, the details of the flaw have not been<br />

released. It is rumoured that the flaw would lead to Denial of Service (DoS) attack.<br />

Solution: Upgrade to version 2.0 or higher.<br />

CVE-2005-3901<br />

iTunes For Windows < 6.0 Local Code Execution<br />

<strong>PVS</strong> ID: 3296 FAMILY: Web Clients RISK: HIGH NESSUS ID:20218<br />

Description: Synopsis :\n\nThe remote host contains an application that is affected by a local code<br />

execution flaw.\n\nAccording to its banner, the version of iTunes for Windows on the<br />

remote host launches a helper application by searching for it through various system paths.<br />

An attacker with local access can leverage this issue to place a malicious program in a<br />

system path and have it called before the helper application.<br />

Solution: Upgrade to version 6.0 or higher.<br />

CVE-2005-2938<br />

HTTPrint Scanning Software Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3297 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Family Internet Services 849

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!