27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PHP < 4.4.4 / 5.1.4 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3732 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running a version of PHP that is older than 4.4.4 or 5.1.5. This version is reported<br />

vulnerable to several flaws that may allow an attacker with the right to execute PHP scripts<br />

the ability to execute arbitrary code. Executed code would be run with the permissions of<br />

the web server process.<br />

Solution: Upgrade to version 4.4.4, 5.1.5 or higher.<br />

WFTPD <<br />

CVE-2006-4486<br />

<strong>PVS</strong> ID: 3733 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote WFTP<br />

server vulnerable to a remote buffer overflow. The server allegedly does not properly parse<br />

and verify input to the 'CWD', 'DELE', 'APPE', 'MDTM', 'MKD', 'RMD', 'MLST', 'RNFR',<br />

'SIZE', 'XCWD', 'XMKD', and XRMD commands. An attacker exploiting this flaw would<br />

need to be able to authenticate to the FTP server. Successful exploitation would result in<br />

the attacker executing arbitrary code on the WFTP server.<br />

Solution: No solution is known at this time.<br />

CVE-2006-5826<br />

ALT-N MDaemon POP Server < 9.06 USER / APOP Command Overflow<br />

<strong>PVS</strong> ID: 3734 FAMILY: POP Server<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nA buffer overflow<br />

vulnerability has been reported for MDaemon. The vulnerability is due to inadequate<br />

bounds checking one some POP server commands. Namely, 'USER' and 'APOP'. An<br />

attacker can exploit this vulnerability by submitting a very large values to these commands<br />

on the POP server. This will cause the MDaemon service to crash when attempting to<br />

process the command. Successful exploitation would lead to the attacker executing<br />

arbitrary code on the remote server.<br />

Solution: Upgrade to version 9.06 or higher.<br />

CVE-2006-4364<br />

phpCOIN < 1.2.4 Multiple Script _CCFG[_PKG_PATH_INCL] Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3735 FAMILY: CGI<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 964

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!