27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3459 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20996<br />

Description: Synopsis :\n\nThe remote backup client is susceptible to denial of service<br />

attacks.\n\nAccording to its version number, the installed instance of Retrospect Client for<br />

Windows reportedly will stop working if it receives a packet starting with a<br />

specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to<br />

leverage this flaw to prevent the affected host from being backed up.<br />

Solution: Upgrade to version 6.5.138, 7.0.109 or higher.<br />

CVE-2006-0995<br />

Retrospect Client for Windows Malformed Packet DoS<br />

<strong>PVS</strong> ID: 3460 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20996<br />

Description: Synopsis :\n\nThe remote backup client is susceptible to denial of service<br />

attacks.\n\nAccording to its version number, the installed instance of Retrospect Client for<br />

Windows reportedly will stop working if it receives a packet starting with a<br />

specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to<br />

leverage this flaw to prevent the affected host from being backed up.<br />

Solution: Upgrade to version 6.5.138, 7.0.109 or higher.<br />

CVE-2006-0995<br />

Retrospect Client < 6.5.138 / 7.0.109 Malformed Packet DoS<br />

<strong>PVS</strong> ID: 3461 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:20996<br />

Description: Synopsis :\n\nThe remote backup client is susceptible to denial of service<br />

attacks.\n\nAccording to its version number, the installed instance of Retrospect Client for<br />

Windows reportedly will stop working if it receives a packet starting with a<br />

specially-crafted sequence of bytes. An unauthenticated remote attacker may be able to<br />

leverage this flaw to prevent the affected host from being backed up.<br />

Solution: Upgrade to version 6.5.138, 7.0.109 or higher.<br />

CVE-2006-0995<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Invision Power Board showtopic.php st Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3462 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Invision Board, a CGI suite designed to set up a<br />

bulletin board system on the remote web server. This version of Invision Board is<br />

vulnerable to a flaw in the way that it handles the 'st' parameter of the 'showtopic' php<br />

Family Internet Services 891

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!