27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

script. Successful exploitation may allow an attacker to execute arbitrary SQL statements<br />

against the remote host.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-2217<br />

Acme thttpd < 2.26 htpasswd Utility Overflow<br />

<strong>PVS</strong> ID: 3463 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a vulnerable version of Acme thttpd. It is reported that versions prior to 2.26<br />

contain a flaw within the 'htpasswd' utility. The htpasswd binary does not correctly verify<br />

the amount of data that it is parsing. Given this, a long argument passed to the htpasswd<br />

utility may cause a buffer overflow. An attacker exploiting this flaw would need to be able<br />

to find a system that calls htpasswd via a dynamic page (such as a CGI script). In addition,<br />

the application is vulnerable to a flaw in the way that it creates local temporary files. A<br />

local attacker exploiting this flaw would be able to modify or delete files with the privileges<br />

of the thttpd server process.<br />

Solution: Upgrade to version 2.26 or higher.<br />

CVE-2006-1079<br />

Geeklog lib-sessions.php Session Cookie Handling Administrative Bypass<br />

<strong>PVS</strong> ID: 3464 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Geeklog, an<br />

open-source weblog powered by PHP and MySQL. The installed version of<br />

Geeklog is vulnerable to a flaw in the 'lib-sessions.php' script. Specifically, a<br />

remote attacker can use the script to bypass authentication and gain<br />

administrative access to the Geeklog application. Successful exploitation gives<br />

the attacker the ability to gather confidential data, the ability to compromise file<br />

integrity, and the ability to interrupt services to valid users.<br />

Solution: Upgrade to version 1.3.11sr5, 1.3.9sr5, 1.4.0sr2, or higher.<br />

CVE-2006-1069<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Owl Intranet Engine xrms_file_root Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3465 FAMILY: CGI RISK: HIGH NESSUS ID:21025<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that suffers from a remote file<br />

include vulnerability.\n\nThe remote host is running Owl Intranet Engine, a web-based<br />

document management system written in PHP. The version of Owl Intranet Engine on the<br />

remote host fails to sanitize user-supplied input to the 'xrms_file_root' parameter of the<br />

'lib/OWL_API.php' script before using it in a PHP 'require_once' function. An<br />

Family Internet Services 892

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!