27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade to version 1.1.6 or higher.<br />

CVE-2006-3775<br />

VisNetic MailServer < 8.5.0.5 lang_settings Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3690 FAMILY: SMTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22079<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running VisNetic MailServer, a commercial mail server for the Microsoft platform. The<br />

version of VisNetic MailServer installed on the remote host fails to sanitize user-supplied<br />

input to the 'lang_settings' parameter of the 'accounts/inc/include.php' and<br />

'admin/inc/include.php' scripts before using it to include PHP code. An unauthenticated<br />

attacker may be able to exploit these flaws to view arbitrary files on the remote host or to<br />

execute arbitrary PHP code after injecting it into the mail server's log file.<br />

Solution: Upgrade to version 8.5.0.5 or later.<br />

CVE-2006-0818<br />

X7 Chat Server Detection<br />

<strong>PVS</strong> ID: 3691 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is running an inherently insecure protocol or<br />

application.\n\nThe remote host is running X7 Chat, a web-based chat server. There have<br />

been security flaws associated with the X7 Chat server.<br />

Solution: Ensure that such software is authorized on your network and that it is completely patched<br />

against vulnerabilities.<br />

CVE Not available<br />

CheckPoint Firewall Default Web Server<br />

<strong>PVS</strong> ID: 3692 FAMILY: Web Servers RISK: INFO NESSUS ID:Not Available<br />

Description: The remote server is running a Checkpoint Firewall. Checkpoint Firewall, by default, opens<br />

a web server on port 18264 and allows external and internal access to the server. Many<br />

versions of this software are reported to be vulnerable to a directory traversal flaw.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

OpenCms < 6.2.2 Authentication Bypass<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3693 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 954

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!