27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a 'File Inclusion' flaw.\n\nThe remote host is<br />

running phpCOIN version 1.2.2 or older. This version of phpCOIN is vulnerable to a<br />

remote 'file include' flaw. An attacker exploiting this flaw would be able to execute PHP<br />

script code on the remote web server with the permissions of the web server process.<br />

Successful exploitation would lead to partial loss of confidentiality, integrity, and<br />

availability.<br />

Solution: Upgrade to version 1.2.4 or higher.<br />

CVE-2006-4424<br />

CubeCart < 3.0.13 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3736 FAMILY: CGI RISK: HIGH NESSUS ID:22296<br />

Description: The remote web server contains a PHP application that suffers from multiple<br />

vulnerabilities. The version of CubeCart installed on the remote host fails to properly<br />

sanitize user-supplied input to the 'gateway' parameter before using it in the<br />

'includes/content/gateway.inc.php' script to include PHP code. An unauthenticated remote<br />

attacker may be able to exploit this issue to view arbitrary files or to execute arbitrary PHP<br />

code on the remote host, subject to the privileges of the web server user ID. In addition, the<br />

application fails to initialize the 'searchArray' and 'links' array variables, which could be<br />

leveraged to launch SQL injection and cross-site scripting attacks respectively against the<br />

affected installation as long as PHP's 'register_globals' setting is enabled.<br />

Solution: Upgrade to version 3.0.13 or higher.<br />

CVE-2006-4526<br />

Mailman < 2.1.9rc1 Spoofed Log Entry Injection<br />

<strong>PVS</strong> ID: 3737 FAMILY: CGI RISK: LOW NESSUS ID:22307<br />

Description: Synopsis :\n\nThe remote web server contains a Python application that is affected by a log<br />

spoofing vulnerability.\n\nThe version of Mailman installed on the remote host fails to<br />

sanitize user-supplied input before writing it to the application's 'error' log. An<br />

unauthenticated remote attacker can leverage this flaw to spoof log messages. In addition,<br />

the application is reportedly affected by a denial of service issue involving headers that do<br />

not conform to RFC 2231 as well as several cross-site scripting vulnerabilities.<br />

Solution: Upgrade to version 2.1.9rc1 or higher.<br />

CVE-2006-4624<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Ipswitch IMail Server RCPT String Remote Overflow<br />

<strong>PVS</strong> ID: 3738 FAMILY: SMTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 965

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!