27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by an<br />

arbitrary file upload vulnerability.\n\nThe version of FCKeditor installed on the remote<br />

host allows an unauthenticated attacker to upload arbitrary files containing PHP code and<br />

then to execute them subject to the privileges of the web server user ID.<br />

Solution: Either edit 'editor/filemanager/upload/php/config.php' to disable file uploads or upgrade to<br />

FCKeditor 2.3 Beta or higher.<br />

CVE-2006-2529<br />

Skype Technologies < 2.5.0.78 Arbitrary File Download<br />

<strong>PVS</strong> ID: 3627 FAMILY: Internet Messengers RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote host is using Skype, a peer-to-peer chat and VoIP<br />

software. The remote version of this software contains a flaw where a Skype client,<br />

previously configured to allow downloads, will allow remote attackers to download<br />

arbitrary files from the local file system. This can allow attackers to gain access to<br />

confidential data that may be useful for more sophisticated attacks.<br />

Solution: Upgrade to version 2.5.0.78 or higher.<br />

CVE-2006-2312<br />

Cyrus IMAPD < 2.3.4 'POP3D USER' Command Remote Overflow<br />

<strong>PVS</strong> ID: 3628 FAMILY: IMAP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nAccording to its<br />

banner, the remote Cyrus IMAPD server is vulnerable to a remote buffer overflow attack.<br />

The flaw is in the way that IMAPD handles malformed data sent with the 'POP3D USER'<br />

command. An attacker exploiting this flaw would need to be able to communicate with the<br />

IMAPD server (usually on TCP port 143). A successful attack would result in the attacker<br />

executing arbitrary code on the IMAPD server.<br />

Solution: Upgrade to version 2.3.4 or higher.<br />

CVE-2006-2502<br />

XOOPS < 2.0.9.4 include/common.php nocommon Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3629 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21581<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is vulnerable to local<br />

file include attacks.\n\nThe version of XOOPS installed on the remote host allows an<br />

unauthenticated attacker to skip processing of the application's 'include/common.php' script<br />

and thereby to gain control of the variables '$xoopsConfig[language]' and<br />

'$xoopsConfig[theme_set]', which are used by various scripts to include PHP code from<br />

Family Internet Services 935

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!