27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 7.5.1 or higher.<br />

CVE-2006-2830<br />

Courier Mail Server < 0.53.2 Crafted Username Encoding DoS<br />

<strong>PVS</strong> ID: 3646 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running Courier Mail Server, an open source mail server for Linux and Unix.<br />

The installed version of Courier is prone to a flaw in the way that it handles malformed<br />

'login' strings. Specifically, an attacker who sends a username that includes a '<br />

Solution: Upgrade to version 0.53.2 or higher.<br />

CVE-2006-2659<br />

WordPress < 2.0.3 Arbitrary Code Injection<br />

<strong>PVS</strong> ID: 3647 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote WordPress application is vulnerable to an arbitrary 'code injection'<br />

flaw. The application fails to sanitize cached 'username' data. An attacker exploiting this<br />

flaw would send a malformed request to the WordPress application. Successful exploitation<br />

would result in the attacker running arbitrary commands with the permission of the<br />

WordPress application. The path to the vulnerable WordPress application is '%P'<br />

Solution: Upgrade to version 2.0.3 or higher.<br />

CVE-2006-2667<br />

WinSCP < 3.8.2 Arbitrary Command Insertion<br />

<strong>PVS</strong> ID: 3648 FAMILY: SSH RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to an arbitrary 'command insertion'<br />

flaw.\n\nThe remote host is running WinSCP, a file transfer application that utilizes Secure<br />

Shell (SSH) as the transport protocol. This version of WinSCP is vulnerable to a flaw in the<br />

way that it parses URI strings. An attacker exploiting this flaw would need to be able to<br />

convince a WinSCP user to click on a malicious URI. Successful exploitation would result<br />

in the attacker executing arbitrary commands with the rights of the user running WinSCP.<br />

The reported version of WinSCP is: \n %L<br />

Solution: Upgrade to version 3.8.2 or higher.<br />

CVE-2006-3015<br />

MyBB < 1.1.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 941

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!