27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

web server.<br />

Solution: Upgrade to version 1.4.4 or higher.<br />

CVE-2006-0872<br />

Warez P2P Server/Client Detection<br />

<strong>PVS</strong> ID: 3437 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is running client software that may be considered<br />

questionable.\n\nThe remote server is running the Warez Peer-to-Peer (P2P) client/server<br />

application. This software is used to trade files between peers. The remote host is running<br />

version: \n %L<br />

Solution: Ensure that such software is in alignment with corporate policies and guidelines regarding<br />

appropriate network usage.<br />

CVE Not available<br />

Fedora DS Administration Server < 1.0.1 Information Disclosure<br />

<strong>PVS</strong> ID: 3438 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20952<br />

Description: Synopsis :\n\nThe remote web server is affected by an information disclosure<br />

vulnerability.\n\nThe remote host appears to be running Fedora Directory Server, a<br />

directory server implementation for Fedora Core. The Administration Server, which is used<br />

to manage Fedora DS, allows an unauthenticated attacker to retrieve the admin password<br />

hash through a simple GET request.<br />

Solution: Upgrade to version 1.0.1 or higher.<br />

CVE-2005-3630<br />

Bugzilla Whinedays SQL Injection<br />

<strong>PVS</strong> ID: 3439 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running Bugzilla, a bug-tracking software with a web interface. The version of Bugzilla<br />

on the remote host suffers from a SQL Injection flaw. An attacker exploiting this flaw<br />

would only need to be able to send HTTP queries to the Bugzilla application. Successful<br />

exploitation would result in the attacker executing arbitrary commands on the remote<br />

database server that services Bugzilla.<br />

Solution: Upgrade to version 2.18.5, 2.20.1, 2.21.1 or higher.<br />

CVE-2006-0916<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 884

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!