27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2006-1485<br />

Horde < 3.1.1 Help Viewer Code Execution<br />

<strong>PVS</strong> ID: 3490 FAMILY: CGI RISK: HIGH NESSUS ID:21164<br />

Description: The remote web server contains a PHP application that allows execution of arbitrary PHP<br />

code. The version of Horde installed on the remote host fails to sanitize user-supplied input<br />

before using it in the Help viewer to evaluate code. An unauthenticated attacker could<br />

exploit this flaw to execute arbitrary command on the remote host subject to the privileges<br />

of the web server user ID.<br />

Solution: Upgrade to version 3.1.1 or higher.<br />

CVE-2006-1491<br />

MPlayer Crafted Media File Integer Overflow<br />

<strong>PVS</strong> ID: 3491 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an integer overflow\n\nThe remote host is<br />

using a version of MPlayer, a multimedia video and audio application. This version of<br />

MPlayer is vulnerable to an integer overflow due to a lack of content parsing. An attacker<br />

exploiting this flaw would need to craft a malicious media file and then convince a local<br />

user to download and play the file within MPlayer. Successful exploitation would result in<br />

arbitrary code being executed locally.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-1502<br />

OneOrZero Helpdesk < 1.6.5.3 index.php id Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3492 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running OneOrZero, an open-source helpdesk application. This version of OneOrZero is<br />

vulnerable to a SQL Injection flaw. An attacker exploiting this flaw would be able to<br />

execute arbitrary SQL commands on the backend SQL server. This can lead to loss of<br />

confidentiality, integrity and availability.<br />

Solution: Upgrade to version 1.6.5.3 or higher.<br />

CVE-2006-1501<br />

ZoneAlarm < 6.1.744.001 VSMON.exe Path Subversion Local Privilege Escalation<br />

<strong>PVS</strong> ID: 3493 FAMILY: Generic<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21165<br />

Family Internet Services 900

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!