27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running a version of Yahoo! Messenger that is reported vulnerable to a<br />

remote file extension spoofing flaw. Specifically, if a user sends a malformed download<br />

query that includes many '~@' sequences, the displayed name of the file will obfuscate the<br />

true file type. An attacker can use this flaw to trick users into downloading files that they<br />

believe are not malicious. Successful exploitation might lead to the attacker executing<br />

arbitrary executables on the target system.<br />

Solution: Upgrade to a version higher than 8.0.0.863.<br />

CVE Not available<br />

ClamAV < 0.88.4 UPX rsize Content-Parsing Overflow<br />

<strong>PVS</strong> ID: 3701 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running ClamAV, an antivirus application. The remote host is running version: \n %L<br />

\n\nThere is a remote content-parsing flaw in this version of ClamAV that could lead to a<br />

heap overflow by sending a malformed file compressed with UPX. Successful exploitation<br />

would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 0.88.4 or higher.<br />

CVE-2006-4018<br />

ColdFusion Administrative Interface Authentication Bypass<br />

<strong>PVS</strong> ID: 3702 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a flaw that allows for the<br />

bypassing of authentication.\n\nThe remote host is running Macromedia<br />

ColdFusion, a web application server. This version of Macromedia is<br />

vulnerable to a flaw where an unauthenticated user can bypass authentication<br />

and gain administrative access over the application. Successful exploitation<br />

impacts confidentiality, integrity and availability.<br />

Solution: Upgrade to a version higher than 7,0,2,142559.<br />

CVE-2006-4724<br />

Recursive DNS Server Detection<br />

<strong>PVS</strong> ID: 3703 FAMILY: DNS Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:10539<br />

Description: Synopsis :\n\nThe remote name server allows recursive queries to be performed.\n\nIt is<br />

possible to query the remote nameserver for third party names. If this is your internal<br />

nameserver, then disregard this warning. If the host allows these recursive queries via UDP,<br />

then the host can be used to 'bounce' Denial of Service attacks against another network or<br />

system.<br />

Family Internet Services 957

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!