27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis : \n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running ClamAV, an antivirus application. The remote host is running<br />

version: \n %L \n\nThere are a number of flaws that affect this version of ClamAV, and the<br />

vendor recommends upgrading to version 0.88.1 or higher.<br />

Solution: Upgrade to version 0.88.1 or higher.<br />

CVE-2006-1630<br />

GlobalSCAPE Secure FTP Server < 3.1.4 Build 01.10.2006 Custom Command Remote DoS<br />

<strong>PVS</strong> ID: 3506 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21188<br />

Description: Synopsis :\n\nThe remote FTP server is prone to denial of service<br />

attacks.\n\nGlobalSCAPE Secure FTP Server is installed on the remote Windows host. The<br />

installed version of GlobalSCAPE Secure FTP Server on the remote host is affected by a<br />

denial of service vulnerability involving a lengthy parameter line to an unspecified custom<br />

command.<br />

Solution: Upgrade to version 3.1.4 Build 01.10.2006 or higher.<br />

CVE-2006-1693<br />

GNU Mailman < 2.1.8 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3507 FAMILY: CGI RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the GNU mailman application. It is running a version of Mailman prior to 2.1.8.<br />

These versions of Mailman are prone to several remote attacks that may impact<br />

confidentiality and integrity.<br />

Solution: Upgrade to version 2.1.8 or higher.<br />

CVE-2006-1712<br />

Cherokee Web Server < 0.5.1 XSS<br />

<strong>PVS</strong> ID: 3508 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Cross-Site Scripting (XSS) attack.\n\nThe<br />

remote Cherokee web server is vulnerable to a flaw in the way that it parses user requests.<br />

Specifically, an attacker can create queries such that unsanitized script code is displayed in<br />

user browsers. An attacker exploiting this flaw would need to be able to convince a user to<br />

browse to a malicious URI. Successful exploitation would result in a possible loss of<br />

confidential materials.<br />

Solution: Upgrade to version 0.5.1 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 904

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!