27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2005-3532<br />

Contenido < 4.6.4 class.inuse.php Multiple Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3323 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an flaw that allows attackers to execute<br />

arbitrary commands\n\nThe remote host is running Contenido, a web content-management<br />

application. This version of Contenido is vulnerable to an unspecified 'command execution'<br />

flaw. It is reported that an attacker can, by sending a malformed query, coerce the<br />

application into running system commands. This flaw can only be executed if the<br />

"allow_url_fopen" and "register_globals" PHP variables are enabled. Successful<br />

exploitation would result in loss of confidential data as well as a compromise of system<br />

integrity.<br />

Solution: Upgrade to version 4.6.4 or higher.<br />

Lyris List Manager <<br />

CVE-2005-4132<br />

<strong>PVS</strong> ID: 3324 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Lyris List Manager, a mailing list manager. This version of Lyris is vulnerable to<br />

multiple flaws. There is a flaw in the way that Lyris handles SQL queries that an attacker<br />

could use to execute arbitrary commands on the backend database. There is a flaw that<br />

would allow an attacker to execute arbitrary commands with the permissions of the web<br />

server. Finally, there are several flaws that would allow an attacker to access information<br />

that was not intended for public consumption. An attacker exploiting these flaws would<br />

likely be able to access confidential data and tarnish the integrity of both the web server<br />

and the database.<br />

Solution: Upgrade to a version higher than 8.8a.<br />

CVE-2005-4142<br />

Sights 'N Sounds Media Server <<br />

<strong>PVS</strong> ID: 3325 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Sights 'N Sounds, a media server that streams content to remote web clients. This<br />

version of Sights 'N Sounds is vulnerable to a remote buffer overflow. Specifically, when<br />

an attacker sends an overly long request such as 'GET /MediaListing.exe?', it causes the SWS.exe process to overwrite memory and either crash or<br />

execute arbitrary code.<br />

Solution: Upgrade to a version of higher than 2.0.3b.<br />

Family Internet Services 857

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!