27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3423 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a file upload flaw.\n\nThe remote host is<br />

running RunCMS, a web-based messaging system. This version of RunCMS is vulnerable<br />

to a remote file upload flaw. Specifically, an attacker can create a malicious .php3 or .php5<br />

script and upload it to the RunCMS server. The attacker can then invoke the script, causing<br />

arbitrary code to be run on the RunCMS system.<br />

Solution: Upgrade to version 1.3a3 or higher, when available.<br />

Powerd Detection<br />

CVE-2006-1793<br />

<strong>PVS</strong> ID: 3424 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is using Powerd (version : %L ), an open-source application, to monitor<br />

UPS devices.<br />

Solution: N/A<br />

CVE Not available<br />

Powerd WHATIDO Variable Remote Overflow<br />

<strong>PVS</strong> ID: 3425 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Powerd (version : %L ), an open-source application, to monitor the UPS device. This<br />

version of Powerd is vulnerable to a remote overflow. An attacker exploiting this flaw will<br />

be able to execute arbitrary code on the target machine.<br />

Solution: Block access to the powerd server port (532) from untrusted clients.<br />

LinPHA <<br />

CVE-2006-0681<br />

<strong>PVS</strong> ID: 3426 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20892<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running LinPHA, a web photo gallery application written in PHP. The installed version<br />

of LinPHA suffers from a number of flaws, several of which may allow an unauthenticated<br />

attacker to view arbitrary files or to execute arbitrary PHP code on the remote host subject<br />

to the privileges of the web server user ID. Note that successful exploitation requires that<br />

PHP's 'magic_quotes_gpc' setting be disabled, that an attacker has the ability to create,<br />

upload or edit files on the remote host, or that the application's 'user login events log'<br />

setting be enabled. The host is also vulnerable to a cross-site scripting (XSS) and SQL<br />

injection attacks. Attackers exploiting the XSS flaw would be able to potentially execute<br />

malicious code within a user's browser. A successful SQL Injection attack would give the<br />

Family Internet Services 880

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!