27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE-2006-3331<br />

MyBB < 1.1.4 SQL Injection<br />

<strong>PVS</strong> ID: 3663 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a SQL Injection attack.\n\nThe remote host<br />

is running an older version of MyBulletinBoard. The vendor has released version 1.1.4 in<br />

order to fix a flaw. Specifically, this version of MyBB is vulnerable to a remote SQL<br />

injection flaw. An attacker exploiting this flaw would only need to be able to send a<br />

malformed HTTP query that contains SQL commands. Successful exploitation would result<br />

in the attacker executing arbitrary SQL commands on the backend database server.<br />

Solution: Upgrade to version 1.1.4 or higher.<br />

CVE Not available<br />

Helix RealServer < 11.1.0.801 Remote Overflow<br />

<strong>PVS</strong> ID: 3664 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Helix RealServer streaming media server. All versions of Helix 10.0.x and<br />

11.0.x are vulnerable to multiple remote buffer overflows. Apparently, the application does<br />

not properly sanitize malformed HTTP requests. An attacker exploiting this flaw would<br />

only need to be able to send HTTP requests to the Helix server. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 11.1.0.801 or higher.<br />

Yahoo! Messenger <<br />

CVE-2006-3276<br />

<strong>PVS</strong> ID: 3665 FAMILY: Internet Messengers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of Yahoo! Messenger that is reported vulnerable to a remote overflow.<br />

An attacker exploiting this flaw would craft a malicious message that included non-ASCII<br />

characters. The attacker would then send the malformed message to another Yahoo!<br />

Messenger user. When the user received the malicious message, the overflow would be<br />

triggered and the application would crash. In addition, the remote client is vulnerable to a<br />

flaw where remote users can initiate a browser connection by sending a malformed string to<br />

the Yahoo! Messenger Client.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-3298<br />

Nokia Intellisync Web Portal Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 946

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!