27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote application is prone to a denial of service (DoS) attack.\n\nThe<br />

remote host appears to be running CommuniGate Pro, a commercial email and groupware<br />

application. The version of CommuniGate Pro installed on the remote host includes an<br />

LDAP server that reportedly fails to handle malformed LDAP requests. A user can leverage<br />

this issue to crash not just the LDAP server but also the entire application on the remote<br />

host.<br />

Solution: Upgrade to version 5.0.8 or higher.<br />

CVE-2006-0468<br />

Lotus Domino Server < 7.0.1 LDAP Component Unspecified DoS<br />

<strong>PVS</strong> ID: 3416 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running a version of Lotus Domino Server that is prone to a Denial of<br />

Service (DoS) attack. While the details are unknown, it is alleged that a malformed LDAP<br />

query will cause the server to become unresponsive. This can lead to a loss of availability.<br />

Solution: Upgrade to version 7.0.1 or higher.<br />

CVE-2005-2712<br />

MyBulletinBoard < 1.04 SQL Injection<br />

<strong>PVS</strong> ID: 3417 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running MyBulletinBoard, a PHP-based bulletin board. The<br />

remote version of this software is prone to SQL injection attacks due to its failure to<br />

sanitize user-supplied input to various scripts before using it in database queries. This may<br />

allow an attacker to uncover sensitive information such as password hashes, access the<br />

Admin Control Panel without authentication, modify existing data, and launch attacks<br />

against the underlying database.<br />

Solution: Upgrade to version 1.04 or higher.<br />

CVE-2006-0638<br />

McAfee Client Detection (SPIPE)<br />

<strong>PVS</strong> ID: 3418 FAMILY: Web Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote client is running McAfee security software and is centrally managed by ePolicy<br />

Orchestrator.<br />

Solution: N/A<br />

CVE Not available<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 878

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!