27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CVE Not available<br />

Xerox WorkCentre Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 3834 FAMILY: Web Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is a Xerox WorkCentre. The exact version of the installed software is %L\nThis version of<br />

WorkCentre is vulnerable to a number of flaws. Namely\n 1) There are multiple command<br />

injection flaws that would allow an anonymous user to execute commands with the<br />

privileges of the WorkCentre Administrator.\n 2) Administrative bypass within the<br />

TFTP/BOOTP auto configuration options. This flaw would allow an attacker to make<br />

configuration changes that would impact the availability of the remote printer\n 3) A flaw<br />

that would allow an attacker to hijack email messages and insert malicious code into the<br />

body of the message\n 4) A flaw within the 'scan-to-mailbox' function that would allow an<br />

attacker to retrieve sensitive files\n 5) A flaw that would allow an attacker to switch to the<br />

HTTP protocol instead of the HTTPS protocol<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2006-6432<br />

Serendipity serendipity[charset] Parameter Local File Inclusion<br />

<strong>PVS</strong> ID: 3835 FAMILY: CGI<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:23752<br />

Description: Synopsis :\n\nThe remote web server contains a PHP application that is affected by<br />

multiple local file inclusion issues.\n\nSeveral scripts included with the version of<br />

Serendipity installed on the remote host fail to sanitize input to the 'serendipity[charset]'<br />

parameter before using it to include PHP code. Provided PHP's 'register_globals' setting is<br />

enabled, an unauthenticated attacker may be able to exploit these issues to view arbitrary<br />

files or to execute arbitrary PHP code on the remote host, subject to the privileges of the<br />

web server user IS.<br />

Solution: No solution is known at this time.<br />

CVE-2006-6242<br />

TNFTPD < 20040811 Globbing Overflow<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 3836 FAMILY: FTP Servers RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running TNFTPD, a port of the NetBSD FTP daemon. This version of TNFTPD is<br />

vulnerable to a remote buffer overflow. The flaw is within the glob.c function. An attacker<br />

exploiting this flaw would need to authenticate to the server and then pass a malformed<br />

string that would be interpreted by the glob function. Successful exploitation results in the<br />

attacker executing arbitrary code on the remote system.<br />

Family Internet Services 992

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!