27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple remote file inclusion vulnerabilities.\n\nThe remote host is running dotProject, a<br />

web-based, open-source project management application written in PHP. The installed<br />

version of dotProject fails to sanitize user input to various parameters and scripts before<br />

using it in calls to PHP functions such as 'include', and 'require_once()'. Provided PHP's<br />

'register_globals' setting is enabled, an unauthenticated attacker may be able to leverage<br />

these issues to view arbitrary files or to execute arbitrary PHP code on the remote host,<br />

subject to the privileges of the web server user ID.<br />

Solution: Upgrade to version 2.0.2 or higher.<br />

CVE-2006-0755<br />

Mac OS X < 10.4.5 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3434 FAMILY: Operating System Detection RISK: LOW NESSUS ID:20911<br />

Description: Synopsis :\n\nThe remote host is missing a Mac OS X update that fixes a security<br />

issue.\n\nThe remote host is running a version of Mac OS X 10.4 that is older than version<br />

10.4.5. Mac OS X 10.4.5 contains several security fixes for a local denial of service<br />

vulnerability. A malicious local user may trigger the vulnerability by invoking an<br />

undocumented system call.<br />

Solution: Upgrade to version 10.4.5 or higher.<br />

CVE-2006-0382<br />

WordPress < 2.0.1 Arbitrary Script Injection<br />

<strong>PVS</strong> ID: 3435 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe installed<br />

version of WordPress on the remote host will accept and execute arbitrary PHP code. This<br />

version of Wordpress is vulnerable to a flaw where a remote attacker can, by sending a<br />

malformed request, execute arbitrary code on the WordPress server. The path to the<br />

installed Wordpress installation is:\n%P<br />

Solution: Upgrade to version 2.0.1 or higher.<br />

CVE-2006-0733<br />

Coppermine Gallery < 1.4.4 Script Injection<br />

<strong>PVS</strong> ID: 3436 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running CopperMine Gallery, a set of PHP scripts to handle galleries of pictures. There is<br />

an injection flaw in this version of Coppermine Gallery. An attacker exploiting this flaw<br />

would only need to be able to send standard HTTP requests to the server. Successful<br />

exploitation would result in the attacker running arbitrary code with the permissions of the<br />

Family Internet Services 883

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!