27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is using the OpenOffice.org application.\n\nDescription<br />

:\n\nThe remote host is running OpenOffice.org %P<br />

Solution: N/A<br />

CVE Not available<br />

WordPress < 2.0.4 SQL Injection / Cross-site Scripting (XSS)<br />

<strong>PVS</strong> ID: 3674 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote web server contains a script that is vulnerable to a SQL injection<br />

attack.\n\nThe remote host is running WordPress blog, a web blog manager written in<br />

PHP.\nThe remote version of this software is vulnerable to various flaws that may\nallow<br />

an attacker to perform a SQL injection attack against the remote host.\nSuccessful<br />

exploitation would allow an attacker to read/write confidential\ndata as well as potentially<br />

execute arbitrary code on the remote database.\n\nIn addition, the remote host is vulnerable<br />

to multiple Cross-Site Scripting (XSS) flaws.\nThe path to the vulnerable application is<br />

'%P'<br />

Solution: Upgrade to version 2.0.4 or higher.<br />

F-Secure Scan Evasion<br />

CVE-2006-3390<br />

<strong>PVS</strong> ID: 3675 FAMILY: Generic<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote antivirus scanner may be tricked into not scanning certain<br />

files.\n\nThe remote host is running F-Secure, a firewall and antivirus software package.<br />

This version of F-Secure is vulnerable to a flaw where specially crafted file names are not<br />

scanned. This can lead to potentially damaging files not being deleted or quarantined. An<br />

attacker exploiting this flaw would only need the ability to create these files and deliver<br />

them to a vulnerable F-Secure user. Successful exploitation would result in a false sense of<br />

security.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-3490<br />

F-Secure Product Detection<br />

<strong>PVS</strong> ID: 3676 FAMILY: Generic RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running F-Secure, a firewall and antivirus software package.<br />

Solution: N/A<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 949

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!