27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running Brooky CubeCart, an online storefront application written in PHP. This version<br />

of CubeCart is vulnerable to a flaw where arbitrary PHP code can be uploaded to the web<br />

server and then executed with the permissions of the web server process. Successful<br />

exploitation would only require that the attacker can send malformed HTTP requests to the<br />

application.<br />

Solution: Upgrade to version 3.0.7 or higher.<br />

CVE-2006-0922<br />

ArGoSoft Mail Server < 1.8.8.6 '_DUMP' Information Disclosure<br />

<strong>PVS</strong> ID: 3447 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20977<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is running the ArGoSoft Mail Server. This<br />

version of ArGoSoft is prone to a remote unauthenticated access flaw. Specifically, as<br />

ArGoSoft does not require authentication prior to allowing the _DUMP directive, an<br />

unauthenticated user can cause the server to disclose potentially confidential data.<br />

Successful exploitation would give the attacker confidential server data.\n\nSecondly, the<br />

remote host is vulnerable to a directory traversal flaw within its IMAP component. An<br />

attacker exploiting this flaw would need to be authenticated. Successful exploitation would<br />

result in the attacker accessing confidential data outside of their default IMAP<br />

folder.\n\nThirdly, the remote server is vulnerable to an HTML Injeciton attack.<br />

Solution: Upgrade to version 1.8.8.6 or higher.<br />

CVE-2006-0928<br />

MTS Professional < 1.61.1.85 SMTP Open Relay<br />

<strong>PVS</strong> ID: 3448 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote SMTP server can be tricked into relaying email, regardless of its<br />

relay configuration.\n\nThe remote host is running the MTS Professional SMTP server.<br />

This version of MTS is vulnerable to a flaw in the way that it handles malformed 'MAIL<br />

FROM:' headers. An attacker exploiting this flaw would send malformed 'MAIL FROM:'<br />

directives to the server. Successful exploitation would result in the attacker being able to<br />

relay traffic through the host.<br />

Solution: Upgrade to version 1.61.1.85 or higher.<br />

CVE-2006-0977<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

MDaemon < 8.15 IMAP Mail Folder Name Remote Overflow<br />

<strong>PVS</strong> ID: 3449 FAMILY: Web Servers NESSUS ID:Not Available<br />

Family Internet Services 887

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!