27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote IMAP server is affected by a buffer overflow<br />

vulnerability.\n\nThe remote host is running Ipswitch IMail Server, a commercial<br />

messaging and collaboration software product for Windows. According to its banner, the<br />

version of Ipswitch installed on the remote host has a buffer overflow issue in its SMTP<br />

server component. The details of the exploit are not currently known. An attacker<br />

exploiting this flaw would send a malformed SMTP command to the server. Successful<br />

exploitation would result in arbitrary code being executed.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-4379<br />

HP OpenView BBC Service Detection<br />

<strong>PVS</strong> ID: 3739 FAMILY: CGI RISK: INFO NESSUS ID:22318<br />

Description: The remote host appears to be running one of the HP OpenView products. This<br />

specific service is an HTTP server. By sending special requests (version, info, status,<br />

ping, services), it is possible to obtain information about the remote host. The<br />

reported server version is: \n %L<br />

Solution: Ensure that this server is configured in accordance with corporate policies and procedures.<br />

CVE Not available<br />

RaidenHTTPD SoftParserFileXml Parameter Remote File Inclusion<br />

<strong>PVS</strong> ID: 3740 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22317<br />

Description: The remote web server contains a PHP script that is susceptible to a remote file inclusion<br />

attack. The remote host is running RaidenHTTPD, a web server for Windows. The version<br />

of RaidenHTTPD on the remote host fails to sanitize user-supplied input to the<br />

'SoftParserFileXml' of the '/raidenhttpd-admin/slice/check.php' script before using it to<br />

include PHP code. An unauthenticated attacker may be able to exploit this issue to view<br />

arbitrary files or to execute arbitrary PHP code on the remote host, subject to the privileges<br />

of the user under which the application runs, which is LOCAL SYSTEM by default.<br />

Solution: No solution is known at this time.<br />

CVE-2006-4723<br />

Quicktime < 7.1.3 Multiple Vulnerabilities<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3741 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote version of QuickTime is affected by multiple code execution<br />

vulnerabilities.\n\nThe remote version of Quicktime is vulnerable to various buffer<br />

overflows involving specially-crafted media files. An attacker may be able to leverage<br />

these issues to execute arbitrary code on the remote host by sending a malformed file to a<br />

victim and having them open it using QuickTime player.<br />

Family Internet Services 966

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!