27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

other files. Successful exploitation of these issues requires that PHP's 'register_globals'<br />

setting be enabled and can be used to view arbitrary files or to execute arbitrary PHP code<br />

on the remote host, subject to the privileges of the web server user ID.<br />

Solution: Upgrade to version 2.0.9.4 or higher.<br />

CVE-2006-2516<br />

<strong>Network</strong>er Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3630 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running EMC Legato <strong>Network</strong>er, an enterprise application that enables centralized file<br />

management, backup and more. This version of <strong>Network</strong>er is vulnerable to a number of<br />

vulnerabilities including buffer overflows. Given this, an attacker can gain full control of<br />

the remote server using a number of attack vectors.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3658<br />

Woltlab Burning Board < 2.3.5 links.php cat Parameter SQL Injection<br />

<strong>PVS</strong> ID: 3631 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running Woltlab Burning Board, a web bulletin board written<br />

in PHP. This version of Burning Board is vulnerable to a remote SQL Injection attack. An<br />

attacker exploiting this flaw would send a malformed 'cat' parameter to the 'links.php'<br />

script. Succesful exploitation would result in the attacker being able to read or write<br />

confidential data. In some instances, the attacker may be able to execute arbitrary code on<br />

the remote database server.<br />

Solution: Upgrade to version 2.3.5 or higher.<br />

CVE-2006-3256<br />

PostgreSQL SQL Injection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3632 FAMILY: Database RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running PostgreSQL, an open source relational database. This version is vulnerable to a<br />

SQL Injection flaw when passed properly formatted SQL queries coupled with<br />

invalidly-encoded multibyte data. An attacker exploiting this flaw would need to be able to<br />

send queries to the PostgreSQL server. As such, this exploit typically requires<br />

authentication. Successful exploitation would result in the attacker executing arbitrary SQL<br />

commands on the database server.<br />

Family Internet Services 936

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!