27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nThe remote web server is a version of Zope that is older than<br />

2.9.4. There is a flaw in this version of Zope that may allow attackers to gain access to<br />

confidential data. It is reported that the 'docutils' module does not properly parse<br />

user-supplied data. Successful exploitation leads to loss of confidential data that may be<br />

useful in further attacks.<br />

Solution: Upgrade to version 2.9.4 or higher.<br />

CVE-2006-3458<br />

WinGate < 6.1.4 Build 1099 IMAP Service Traversal Arbitrary Mail Access<br />

<strong>PVS</strong> ID: 3681 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host appears to be running WinGate Proxy Server, a Windows application for managing<br />

and securing Internet access. According to its banner, the version of WinGate installed on<br />

the remote host is affected by a directory traversal flaw in its IMAP service. An attacker<br />

exploiting this flaw would only need to be able to connect to the IMAP service port,<br />

authenticate and issue a malformed request. Successful exploitation would lead to a loss of<br />

confidential data.<br />

Solution: Upgrade to version 6.1.4 Build 1099 or higher.<br />

CVE-2006-2917<br />

Samba < 3.0.23 smdb Share Remote DoS<br />

<strong>PVS</strong> ID: 3682 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote Samba server, according to its version number ('%L'), may be vulnerable to a<br />

remote attack. An attacker can cause the Samba smbd service to fail by opening a large<br />

number of connections. Successful exploitation leads to a loss of availability.<br />

Solution: Upgrade to version 3.0.23 or higher.<br />

MetaSploit Detection<br />

CVE-2006-3403<br />

<strong>PVS</strong> ID: 3683 FAMILY: Policy<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running software that should be authorized with respect to<br />

corporate policy.\n\nThe remote server is running a MetaSploit Framework server.<br />

Metasploit allows users to automatically exploit and backdoor vulnerable applications via<br />

the network. The version of MetaSploit is %L.<br />

Family Internet Services 951

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!