27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>PVS</strong> ID: 3656 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running the Mambo Content Server, an application for generating dynamic content for<br />

web servers. The remote application is vulnerable to a flaw where remote attackers can<br />

execute arbitrary SQL commands on the database server utilized by Mambo. In order to<br />

exploit this flaw, an attacker would only need to send a malformed HTTP query containing<br />

SQL commands to the 'Name' field of the 'Submit Weblink' form. Successful exploitation<br />

would result in a potential loss of confidentiality, integrity, and availability on the remote<br />

database server.<br />

Solution: Upgrade to version 4.6.1 or higher.<br />

CVE-2006-3262<br />

TWiki Privilege Escalation<br />

<strong>PVS</strong> ID: 3657 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running the TWiki web application. This version of TWiki is vulnerable to a flaw where<br />

users can escalate their privileges, giving them administrative rights to the application. A<br />

valid user account is required in order to exploit this flaw. Successful exploitation leads to<br />

the attacker gaining administrative access. This can lead to a loss of confidentiality,<br />

integrity, and availability. In addition, the remote TWiki application is vulnerable to a 'file<br />

upload' flaw. An attacker exploiting this flaw would be able to insert and execute arbitrary<br />

script code with the permissions of the web server process. This can also lead to a loss of<br />

confidentiality, integrity, and availability.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-2942<br />

Winamp < 5.22 MIDI File Handling Overflow<br />

<strong>PVS</strong> ID: 3658 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running Winamp, a multimedia software application. This version of Winamp is vulnerable<br />

to a buffer overflow. Specifically, when handling a malformed MIDI file, Winamp may<br />

crash, possibly executing arbitrary code. An attacker exploiting this flaw would need to be<br />

able to convince a Winamp user to open a malicious MIDI file.<br />

Solution: Upgrade to version 5.22 or higher.<br />

CVE-2006-3228<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Clearswift MAILsweeper for SMTP < 4.3.20 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3659 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 944

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!