27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote web server is affected by an authentication bypass flaw.\n\nThe<br />

remote host is running ViRobot Linux Server, a commercial anti-virus application server.<br />

The installed version of ViRobot Linux Server has a flaw such that an attacker can bypass<br />

authentication and gain access to its 'filescan' component by supplying a special cookie. An<br />

unauthenticated attacker may be able to leverage this flaw to delete arbitrary files on the<br />

remote host or disable access to the service by submitting scans of a large number of large<br />

files on the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-0864<br />

Mambo Undisclosed Authentication Bypass<br />

<strong>PVS</strong> ID: 3444 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the bypassing of<br />

authentication.\n\nThe remote host is running the Mambo Content Server, an application<br />

for generating dynamic content for web servers. The remote application is vulnerable to a<br />

flaw where remote attackers can bypass authentication and access confidential data. The<br />

exact details of the flaw are unknown; however, it is believed that an attacker exploiting<br />

this flaw would be able to access confidential data that was readable by the web server<br />

process.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1794<br />

Winamp < 5.14 .M3U File Handling Buffer Overflow<br />

<strong>PVS</strong> ID: 3445 FAMILY: Generic RISK: HIGH NESSUS ID:20826<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

using Winamp, a popular media player for Windows. It is possible that a remote attacker<br />

using a specially-crafted playlist can cause a buffer overflow in the version of Winamp<br />

installed on the remote host, resulting in a crash of the application or even execution of<br />

arbitrary code subject to the user's privileges. An attacker exploiting this flaw would need<br />

to be able to convince a Winamp user to open a malicious '.m3u' file.<br />

Solution: Upgrade to version 5.14 or higher.<br />

CVE-2006-0720<br />

Brooky CubeCart < 3.0.7 connector.php Arbitrary File Upload<br />

<strong>PVS</strong> ID: 3446 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 886

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!