27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host is vulnerable to a file-include injection flaw.\n\nThe remote<br />

host is running the Blueshoes framework, a PHP framework for creating web applications.<br />

This version of Blueshoes is vulnerable to a flaw in the GoogleSearch.php script. An<br />

attacker exploiting this flaw would be able to execute arbitrary PHP code on the target<br />

server. Successful exploitation would give the attacker the same rights as the web process.<br />

Solution: No solution is known at this time.<br />

CVE-2006-5250<br />

ClamAV < 0.88.5 PE Handler Content-Parsing Overflow<br />

<strong>PVS</strong> ID: 3794 FAMILY: Web Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis : \n\nThe remote host is vulnerable to a heap overflow.\n\nThe remote host is<br />

running ClamAV, an antivirus application. The remote host is running version: \n %L<br />

\n\nThere is a remote content-parsing flaw in this version of ClamAV that could lead to a<br />

heap overflow. An attacker sending a malformed PE file would be able to exploit this flaw.<br />

Successful exploitation would result in the attacker executing arbitrary code.<br />

Solution: Upgrade to version 0.88.5 or higher.<br />

CVE-2006-5295<br />

Skinny Server Detection<br />

<strong>PVS</strong> ID: 3795 FAMILY: Generic RISK: INFO NESSUS ID:22877<br />

Description: The remote server is an H.323 proxy that understands the Skinny protocol, also known as<br />

SCCP, for 'Skinny Client Control Protocol'. Skinny is Cisco's proprietary lightweight<br />

terminal control protocol used by some VoIP phones to communicate with Cisco<br />

CallManager or Asterisk PBX systems.<br />

Solution: Limit incoming traffic to this port.<br />

CVE Not available<br />

Opera < 9.02 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3796 FAMILY: Web Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22875<br />

Description: Synopsis :\n\nThe remote host contains a web browser that is susceptible to a heap buffer<br />

overflow attack.\n\nThe version of Opera installed on the remote host reportedly contains a<br />

heap buffer overflow vulnerability that can be triggered by a long link. Successful<br />

exploitation of this issue may result in a crash of the application or even allow for<br />

execution of arbitrary code subject to the user's privileges.<br />

Solution: Upgrade to version 9.02 or higher.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 981

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!