27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the attacker. An attacker exploiting this flaw would gain access to confidential data.<br />

Solution: Upgrade to version 0.4.7.2 or higher.<br />

CVE-2006-1243<br />

Horde < 3.1 go.php url Parameter File Disclosure<br />

<strong>PVS</strong> ID: 3477 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21081<br />

Description: The remote web server contains a PHP application that is affected by an information<br />

disclosure flaw. The version of Horde installed on the remote host fails to validate input to<br />

the 'url' parameter of the 'services/go.php' script before using it to read files and return their<br />

contents. An unauthenticated attacker may be able to leverage this issue to retrieve the<br />

contents of arbitrary files on the affected host subject to the privileges of the web server<br />

user ID. This can result in the disclosure of authentication credentials used by the affected<br />

application as well as other sensitive information. Note that successful exploitation of this<br />

issue seems to require that PHP's 'magic_quotes_gpc' be disabled, although this has not<br />

been confirmed by the vendor.<br />

Solution: Upgrade to version 3.1 or higher.<br />

CVE-2006-1260<br />

Dwarf HTTP Server < 1.3.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3478 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Dwarf HTTP Server. This version of Dwarf is vulnerable to multiple input<br />

flaws due to a lack of data validation. An attacker exploiting these flaws will be able to<br />

impact confidentiality and integrity on the remote server.<br />

Solution: Upgrade to version 1.3.3 or higher.<br />

CVE-2006-0820<br />

PHP iCalendar Local File Inclusion<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3479 FAMILY: CGI RISK: HIGH NESSUS ID:17129<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running PHP iCalendar, an open-source PHP blog. This version of iCalendar is<br />

vulnerable to a flaw wherein a local user can gain access to confidential data by requesting<br />

the data from the iCalendar application. Successful exploitation would lead to a local user<br />

gaining access to confidential data. In addition, the remote host is vulnerable to a remote<br />

file upload flaw. An attacker exploiting this flaw would be able to manipulate the<br />

application into uploading and executing potentially malicious scripts. The referenced URI<br />

is:\n%P<br />

Family Internet Services 896

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!