27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Kerio MailServer version 6.0.10 or lower. There is a flaw in the<br />

remote version of this server that would allow an attacker to cause the application to fail.<br />

While the details of the flaw are unknown, it is alledged that an attacker can launch the<br />

attack without any credentials and render the target service unavailable.<br />

Solution: Upgrade to version 6.1.3 Patch 1 or higher.<br />

CVE-2006-0742<br />

Easy File Sharing Web Server Format String<br />

<strong>PVS</strong> ID: 3470 FAMILY: Web Servers RISK: HIGH NESSUS ID:21039<br />

Description: Synopsis :\n\nThe remote web server suffers from a format string vulnerability.\n\nThe<br />

remote host is running Easy File Sharing Web Server, a file sharing application / web<br />

server for Windows. The version of Easy File Sharing Web Server installed on the remote<br />

host may crash if it receives requests with an option parameter consisting of a format string.<br />

It is unknown whether this issue can be exploited to execute arbitrary code on the remote<br />

host, although it is likely the case. In addition, the application reportedly allows remote<br />

users to upload arbitrary files to arbitrary locations on the affected host. An attacker may be<br />

able to leverage this issue to completely compromise the host by placing them in the startup<br />

folder and waiting for a reboot. Additionally, it fails to sanitize input to the 'Description'<br />

field when creating a folder or uploading a file, which could lead to cross-site scripting<br />

attacks. Note that by default the application runs with the privileges of the user who started<br />

it, although it can be configured to run as a service.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1160<br />

Gallery < 2.0.4 Watermark Function stepOrder Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3472 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21040<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple local file include flaws.\n\nThe remote host is running Gallery, a web-based photo<br />

album application written in PHP. The version of Gallery installed on the remote host fails<br />

to sanitize input to the 'stepOrder' parameter of the 'upgrade/index.php' and<br />

'install/index.php' scripts before using it in a PHP 'require()' function. An unauthenticated<br />

attacker may be able to exploit this issue to view arbitrary files or to execute arbitrary PHP<br />

code on the affected host provided PHP's 'register_globals' setting is enabled.<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

CVE-2006-1219<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch Multiple Products < 2006.03 IMAP FETCH Command Overflow<br />

Family Internet Services 894

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!