27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 4.31 or higher.<br />

CVE-2005-4445<br />

PhpGedView PGV_BASE_DIRECTORY Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3333 FAMILY: CGI RISK: HIGH NESSUS ID:20339<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to a remote<br />

file inclusion vulnerability.\n\nThe remote host appears to be running PhpGedView, a<br />

web-based genealogy program written in PHP. The version of PhpGedView installed on the<br />

remote host fails to sanitize user-supplied input to the 'PGV_BASE_DIRECTORY'<br />

parameter of the 'help_text_vars.php' script before using it in a PHP 'require' function.<br />

Provided PHP's 'register_globals' setting is enabled, an unauthenticated attacker may be<br />

able to exploit this flaw to read arbitrary files on the remote host and or run arbitrary code,<br />

possibly taken from third-party hosts, subject to the privileges of the web server user ID. In<br />

addition, the application reportedly fails to sanitize user input to the 'user_language',<br />

'user_email', and 'user_gedcomid' parameters of the 'login_register.php' script, which could<br />

be used by an attacker to inject arbitrary PHP code into a log file that can then be executed<br />

on the affected host, subject to the permissions of the web server user ID.<br />

Solution: Upgrade to version 3.3.7 or 4.0 beta 3 and apply the patch referenced in the vendor<br />

advisory above.<br />

CVE-2005-4468<br />

<strong>Network</strong> Block Device Server Detection<br />

<strong>PVS</strong> ID: 3334 FAMILY: Generic RISK: LOW NESSUS ID:20340<br />

Description: Synopsis :\n\nThe remote host is running a remote storage service.\n\nThe remote host is<br />

running a <strong>Network</strong> Block Device (NBD) server, which allows one Linux host to use<br />

another as one of its block devices.<br />

Solution: Ensure that you are running the latest version of NBD.<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Mantis < 0.19.5 Multiple Unspecified Vulnerabilities<br />

<strong>PVS</strong> ID: 3335 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack as well as other unspecified vulnerabilities.\n\nThe remote host appears to be<br />

running a vulnerable version of Mantis, a bug tracker web application written in PHP. It is<br />

reported that versions 0.19.3 and lower are vulnerable to a number of flaws. While the<br />

details of the flaws are unknown, it is believed that successful exploitation of the flaws<br />

would lead to an attacker uploading files or executing code on the remote database.<br />

Solution: Upgrade to version 0.19.5 (or 1.0.0 RC5) or higher.<br />

Family Internet Services 860

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!