27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2005-3639<br />

MySQL MERGE Table Privilege Escalation<br />

<strong>PVS</strong> ID: 3697 FAMILY: Database RISK: LOW NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows attackers to retrieve<br />

sensitive files or data.\n\nAccording to its version number, the installation of MySQL on<br />

the remote host may be prone to a flaw where an authenticated user can escalate privileges<br />

on the remote database server. Specifically, even if a user has had access revoked to a<br />

certain table, they may be able to access it from another table. Successful exploitation<br />

would lead to a loss of confidential data.<br />

Solution: Upgrade to version 4.1.21, 5.0.24 or higher.<br />

CVE-2006-4031<br />

IBM DB2 Version Detection<br />

<strong>PVS</strong> ID: 3698 FAMILY: Database RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running IBM DB2 database version %L.<br />

Solution: N/A<br />

CVE Not available<br />

Hobbit Monitor < 4.1.2p2 config Command Traversal Arbitrary File Access<br />

<strong>PVS</strong> ID: 3699 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Directory Traversal flaw.\n\nThe remote<br />

host is running Hobbit Monitor, a web-based host/network monitoring software. This<br />

version of Hobbit Monitor is prone to a flaw where remote attackers can use the 'config'<br />

command to access confidential files. To exploit this issue, the attacker would connect to<br />

the Hobbit application (typically on port 1984) and send a 'config ../../../../../'<br />

request. Successful exploitation would result in the attacker gaining access to confidential<br />

data.<br />

Solution: Upgrade to version 4.1.2p2 or higher.<br />

CVE-2006-4003<br />

Yahoo! Messenger < 8.0.0.863 File Extension Spoofing<br />

<strong>PVS</strong> ID: 3700 FAMILY: Internet Messengers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 956

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!