27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'file include' flaw.\n\nThe remote<br />

host is running Squirrelmail, a web-based email client. This version of Squirrelmail is<br />

vulnerable to a 'file include' flaw within the redirect.php script. An attacker exploiting this<br />

flaw would be able to execute local commands. This can lead to the reading, writing or<br />

deletion of critical data. To exploit this flaw, the attacker would only need to be able to<br />

send web requests to the server.<br />

Solution: Upgrade to version 1.4.8 or higher.<br />

CVE-2006-2842<br />

SpamAssassin spamd vpopmail Username Command Injection<br />

<strong>PVS</strong> ID: 3640 FAMILY: SMTP Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running SpamAssassin, an anti-spam software application that<br />

detects and blocks spam emails. Due to a content-parsing error, SpamAssassin can be<br />

tricked into executing arbitrary commands with the privileges of the SpamAssassin spamd<br />

process. Additionally, the remote version of SpamAssassin must be running with either<br />

'--vpopmail' or '--paranoid' enabled.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-2447<br />

BASE < 1.2.5 BASE_path Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3641 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:21611<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is prone to remote file<br />

inclusion attacks.\n\nThe remote host is running BASE, a web-based tool for analyzing<br />

alerts from one or more SNORT sensors. The version of BASE installed on the remote host<br />

fails to sanitize input to the 'BASE_path' parameter before using it in PHP include_once()<br />

function in several scripts. Provided PHP's 'register_globals' setting is enabled, an<br />

unauthenticated attacker may be able to exploit this flaw to view arbitrary files on the<br />

remote host or to execute arbitrary PHP code, possibly taken from third-party hosts.<br />

Solution: Upgrade to version 1.2.5 or higher.<br />

CVE-2006-2685<br />

WinGate < 6.1.3 POST Request Buffer Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3642 FAMILY: Web Servers RISK: HIGH NESSUS ID:21674<br />

Family Internet Services 939

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!