27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: The remote host is running the SAP Internet Transaction Server (ITS). According to<br />

embedded HTML comments, the version and build information is: \n %L<br />

Solution: N/A<br />

CVE Not available<br />

SAP Internet Transaction Server < 6.20 Patch 18 wgate urlmime Parameter XSS<br />

<strong>PVS</strong> ID: 3753 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22465<br />

Description: The remote web server contains a CGI script that is vulnerable to a cross-site scripting<br />

attack. The remote web server fails to sanitize the contents of the 'urlmime' parameter to the<br />

'/scripts/wgate' script before using it to generate dynamic web content. An unauthenticated<br />

remote attacker may be able to leverage this issue to inject arbitrary HTML and script code<br />

into a user's browser to be evaluated within the security context of the affected web site.<br />

Solution: Upgrade to version 6.20 Patch 18 or higher.<br />

CVE-2006-5114<br />

OpenBSD Portable OpenSSH < 4.4.p1 GSSAPI Authentication Overflow<br />

<strong>PVS</strong> ID: 3754 FAMILY: SSH RISK: HIGH NESSUS ID:22466<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running a version of OpenSSH that is vulnerable to a flaw in the way that it handles<br />

GSSAPI authentication. If the SSH server is configured to utilize GSSAPI authentication<br />

then the host may be compromised by a remote attacker with access to the SSH port<br />

(typically 22). Successful exploitation would result in remote code execution. The reported<br />

version number is: \n %L<br />

Solution: Upgrade to version 4.4.p1 or higher.<br />

CVE-2006-5052<br />

OpenSSL < 0.9.7l / 0.9.8d Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3755 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is using a version of OpenSSL that is older than 0.9.6m or 0.9.7d There are several bugs in<br />

this version of OpenSSL that may allow an attacker to either execute remote code or cause<br />

a Denial of Service (DoS).<br />

Solution: Upgrade to version 0.9.7l, 0.9.8d or higher.<br />

CVE-2006-3738<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 970

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!