27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

attacker the ability to execute arbitrary commands on the backend database server.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1924<br />

WebGUI < 6.8.6 'Anonymous' Account Creation<br />

<strong>PVS</strong> ID: 3427 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running WebGUI, a content management framework. The<br />

remote version of this software is vulnerable to a flaw where an anonymous user can be<br />

created even if the Administrator has configured the site to reject the creation of<br />

anonymous accounts. An attacker exploiting this flaw would only need to be able to send a<br />

malformed HTTP request to the WebGUI server. Successful exploitation would lead to the<br />

creation of an anonymous account.<br />

Solution: Upgrade to version 6.8.6 or higher.<br />

CVE-2006-0680<br />

AttachmateWRQ Reflection for Secure IT Server SFTP Format String<br />

<strong>PVS</strong> ID: 3428 FAMILY: SSH<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20902<br />

Description: The remote SSH server is affected by a format string vulnerability. The remote host is<br />

running AttachmateWRQ Reflection for Secure IT Server / F-Secure SSH Server, a<br />

commercial SSH server. According to its banner, the installed version of this software<br />

contains a format string vulnerability in its SFTP subsystem. An remote authenticated<br />

attacker may be able to execute arbitrary code on the affected host subject to his privileges<br />

or crash the server itself.<br />

Solution: Upgrade or patch according to vendor recommendations or edit the software's configuration<br />

to disable the SFTP subsystem.<br />

CVE-2006-0705<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Microsoft Windows Media Player Bitmap File Processing Overflow (911565)<br />

<strong>PVS</strong> ID: 3429 FAMILY: Generic RISK: HIGH NESSUS ID:20905<br />

Description: Synopsis :\n\nArbitrary code can be executed on the remote host through the Windows<br />

Media Player.\n\nThe remote host is running Microsoft Media Player version 10. There is a<br />

vulnerability in the remote version of this software that may allow an attacker to execute<br />

arbitrary code on the remote host. To exploit this flaw, one attacker would need to set up a<br />

rogue BMP image and send it to a victim on the remote host.<br />

Family Internet Services 881

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!