27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

SonicWall Firewall Detection<br />

<strong>PVS</strong> ID: 3619 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running a SonicWall Firewall.<br />

Solution: N/A<br />

CVE Not available<br />

FortressSSH < 0.47 SSH_MSG_KEXINIT Logging Remote Overflow<br />

<strong>PVS</strong> ID: 3620 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of the FortressSSH SSH server that is vulnerable to a remote buffer<br />

overflow. An attacker exploiting this flaw would send a malformed key exchange.<br />

Successful exploitation would give the attacker the ability to execute arbitrary code on the<br />

remote server.<br />

Solution: Upgrade to version 0.47 or higher.<br />

CVE-2006-2421<br />

Resin < 3.0.19 Directory Traversal and Path Disclosure Vulnerabilities<br />

<strong>PVS</strong> ID: 3621 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote web<br />

server is running Resin. Versions 3.0.17 and 3.0.18 are vulnerable to multiple flaws which<br />

impact Confidentiality. An attacker exploiting these flaws would be able to disclose<br />

physical paths and read files outside of the web server root directory. Reading of<br />

confidential files could lead to more sophisticated attacks.<br />

Solution: Upgrade to version 3.0.19 or higher.<br />

CVE-2006-1953<br />

PHP-Fusion < 6.00.308 SQL Injection<br />

<strong>PVS</strong> ID: 3622 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nAccording to its<br />

version number, the remote host is running a version of PHP-Fusion that suffers from a<br />

flaw within the 'messages.php' script. messages.php fails to correctly parse user-supplied<br />

data and is vulnerable to a SQL injection attack. An attacker exploiting this flaw would<br />

Family Internet Services 933

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!