27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CVE-2006-4819<br />

Cerberus Helpdesk rpc.php Information Disclosure<br />

<strong>PVS</strong> ID: 3797 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:22876<br />

Description: Synopsis :\n\nThe remote web server contains a PHP script that is affected by an<br />

information disclosure issue.\n\nThe remote host is running Cerberus Helpdesk, a<br />

web-based helpdesk suite written in PHP. The installed version of Cerberus Helpdesk on<br />

the remote host allows an unauthenticated attacker to retrieve information about ticket<br />

requesters through the 'rpc.php' script.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-5428<br />

PostgreSQL Multiple Local DoS Vulnerabilities<br />

<strong>PVS</strong> ID: 3798 FAMILY: Database<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running PostgreSQL, an open source relational database. This version is<br />

vulnerable to multiple flaws where an attacker with local access can cause the service to<br />

stop. Successful exploitation would result in the system being unavailable to legitimate<br />

users.<br />

Solution: Upgrade to version 7.3.16, 7.4.14, 8.0.9, 8.15 or higher.<br />

CVE-2006-5542<br />

FtpXQ FTP Server < 3.0.2 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3799 FAMILY: FTP Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote<br />

FtpXQ FTP server vulnerable to multiple flaws. Versions 3.01 and lower are vulnerable to<br />

a buffer overflow that results in a Denial of Service (DoS) attack. In addition, versions 3.01<br />

and lower ship with two default accounts that are enabled. These accounts<br />

are:\nanonymous/NULL and\ntest/test\n\nAn attacker exploiting the 'test' default account<br />

would have read/write capability on the remote FTP server.<br />

Solution: Upgrade to version 3.0.2 or higher.<br />

CVE-2006-5569<br />

Winamp < 5.31 Multiple Heap Overflows<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3800 FAMILY: Generic RISK: HIGH NESSUS ID:Not Available<br />

Family Internet Services 982

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!