27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Solution: No solution is known at this time.<br />

CVE-2006-1250<br />

Jetty < 5.16.0 JSP Source Code Disclosure<br />

<strong>PVS</strong> ID: 3301 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server can disclose source code.\n\nThe remote host is<br />

running Jetty, a Java web server that can be downloaded off the Internet and is currently<br />

bundled with some IBM applications. This version of Jetty is vulnerable to a remote 'source<br />

code disclosure' flaw. An attacker exploiting this flaw would append a '%5C' to the end of a<br />

'.jsp' URI request. Successful exploitation would result in the attacker downloading source<br />

code.<br />

Solution: Upgrade to version 5.16.0 or higher.<br />

CVE-2005-3747<br />

MailEnable IMAP Service Remote DoS<br />

<strong>PVS</strong> ID: 3302 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of MailEnable's IMAP service that is prone to a remote<br />

Denial of Service (DoS) attack. Specifically, an attacker requesting a nonexistent mailbox<br />

can crash the service. An attacker exploiting this flaw would need to be able to authenticate<br />

with some valid user account. Following successful authentication, the attacker would<br />

request a nonexistent mailbox. Successful exploitation leads to a loss of availability.<br />

Solution: Upgrade to MailEnable Professional 1.7.1 or higher or to MailEnable Enterprise Edition 1.2<br />

or higher.<br />

CVE-2006-0504<br />

WebCalendar < 1.0.2 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3303 FAMILY: CGI RISK: HIGH NESSUS ID:20250<br />

Description: The remote web server has a PHP application that is affected by multiple vulnerabilities.<br />

The remote version of WebCalendar does not validate input to the 'id' and 'format'<br />

parameters of the 'export_handler.php' script before using it to overwrite files on the remote<br />

host, subject to the privileges of the web server user ID. In addition, the 'activity_log.php',<br />

'admin_handler.php', 'edit_report_handler.php', 'edit_template.php' and 'export_handler.php'<br />

scripts are prone to SQL injection attacks and the 'layers_toggle.php' script is prone to<br />

HTTP response splitting attacks.<br />

Family Internet Services 851

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!