27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 0.88.2 or higher.<br />

Limbo CMS <<br />

CVE-2006-1989<br />

<strong>PVS</strong> ID: 3526 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the Limbo Content Management System (CMS). This version of Limbo is<br />

vulnerable to a flaw where remote attackers can include arbitrary code within HTTP<br />

requests. By using such a tactic, the remote attacker can execute arbitrary code with the<br />

permissions of the remote web server. In addition, the remote host is vulnerable to a SQL<br />

Injection attack. An attacker exploiting this flaw would send a malformed HTTP query to<br />

the server that would, upon parsing, cause the web server to execute arbitrary SQL<br />

commands on the backend database server.<br />

Solution: No solution is known at this time.<br />

CVE-2008-0734<br />

MySQL Remote Overflow and Information Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 3527 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

version number, the installation of MySQL on the remote host may be prone to multiple<br />

buffer overflows. The MySQL server is also vulnerable to multiple information disclosure<br />

flaws. An attacker exploiting the overflow would need to be able to authenticate to the<br />

MySQL server. An attacker exploiting the information disclosure flaw would only need to<br />

be able to send malformed 'login' packets to the server. This version of MySQL is also<br />

prone to a remote Denial of Service (DoS) due to an inability to properly parse a<br />

malformed call to the date_format function.<br />

Solution: Upgrade to version 4.0.27 / 4.1.19 / 5.0.27 / 5.1.10 or higher.<br />

sBLOG <<br />

CVE-2006-1516<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3528 FAMILY: CGI RISK: HIGH NESSUS ID:21313<br />

Description: The remote web server contains a PHP script that is prone to SQL injection attacks. The<br />

remote host is running sBLOG, a PHP-based blog application. The installed version of<br />

sBLOG fails to validate user input to the 'keyword' parameter of the 'search.php' script<br />

before using it to generate database queries. Regardless of PHP's 'magic_quotes_gpc'<br />

setting, an unauthenticated attacker can leverage this issue to manipulate database queries<br />

to bypass authentication, disclose sensitive information, modify data, or launch attacks<br />

against the underlying database.<br />

Family Internet Services 910

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!